User manual DSC ALEXOR PC9155

DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!

If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Diplodocs provides you a fast and easy access to the user manual DSC ALEXOR PC9155. We hope that this DSC ALEXOR PC9155 user guide will be useful to you.


DSC ALEXOR PC9155 : Download the complete user guide (2726 Ko)

You may also download the following manuals related to this product:

   DSC ALEXOR PC9155 (3068 ko)

Manual abstract: user guide DSC ALEXOR PC9155

Detailed instructions for use are in the User's Guide.

[. . . ] 2-Way Wireless Security Suite User Manual N11427 IMPORTANT: This manual contains information on limitations regarding product use and function and information on the limitations as to liability of the manufacturer. The entire manual should be carefully read. FCC COMPLIANCE STATEMENT CAUTION: Changes or modifications not expressly approved by Digital Security Controls could void your authority to use this equipment. This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interfer-ence in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. [. . . ] If , is entered, the system will delete the code (including the associated prox tag) immediately and the user will be returned to select another code. Proximity Tag Enrollment (PT4/PT8) Proximity (prox) tag readers are only available on WT5500P keypads. Refer to the label on top of the keypad to confirm which model you have. Scroll to the desired user code (01-16, or 40 for the master code) then press [ ]. The following message will be displayed after the user access code is entered: Present Tag or Press # to Exit 4. Place the prox tag near the tag reader ( ) at the left side of the display to assign it to the user code. The following message will be displayed: Tag Enrolled Successfully If an attempt is made to assign a prox tag to an existing user code that has an associated prox tag, the following message will be displayed: Duplicate Tag/User Code Return to Step 2 for instructions on how to enroll a user code. Erasing a User Code/Proximity Tag Enter [ ][5][Master Code], select the desired user code. The keypad will display the user number (e. g. , 01) with a letter "P" if a user code has already been programmed and a letter "T" if a code and prox tag have been programmed. NOTE: User 40 for the master code cannot be deleted; an attempt to delete this user code will delete the prox tag only. Proximity Tag Operation Place the prox tag near the tag reader ( ) at the left side of the display to arm/disarm your system. When arming the system, the following message will be displayed: Exit Delay in Progress When disarming the system, the following message will be displayed: System Disarmed If there is an attempt to swipe a prox tag that has not been enrolled, an error tone will sound and the following message will be displayed: Invalid Tag Return to Step1 for instructions on how to enroll the prox tag. WARNING: KEEP THE PROXIMITY TAG OUT OF REACH OF SMALL CHILDREN. THE MATERIALS ASSOCIATED WITH THIS PRODUCT (LITHIUM BATTERIES, ETC. ) MUST BE RECYCLED ACCORDING TO LOCAL RULES AND REGULATIONS. 8 User Function Commands Disarm the system then enter , [Master Code]. The , command is used to gain access to the following list of Master functions of the system: [1] Time and Date - Enter 4 digits for 24hr System Time (HH-MM). [4] System Test - The system's Siren Output - 4 seconds (2 seconds medium volume, 2 seconds high volume), keypad lights, back-up battery pack and communicator are tested. [5] Enable DLS / Allow Remote System Service - If enabled, the installer will be able to access Installer Programming remotely using DLS (Downloading Software). This function provides a window for telephone ring detection by the alarm system. The DLS window will remain open for 6 hours, during which time the installer will be able to enter DLS an unlimited number of times. After the 6-hr window has expired, access to programming via DLS will be unavailable until the window is re-opened. [6] User Call-up - If enabled by the installer, the panel will make 1 attempt to call the downloading computer. The downloading computer must be waiting for the panel to call before downloading can be performed. [9] Late to Open Enable/Disable - This function enables or disables the Late to Open time programmed in [0]. [0] Late to Open Time of Day - This function is used to program the time setting enabled in [9]. [. . . ] Criminal Knowledge This system contains security features which were known to be effective at the time of manufacture. It is possible for persons with criminal intent to develop techniques which reduce the effectiveness of these features. It is important that a security system be reviewed periodically to ensure that its features remain effective and that it be updated or replaced if it is found that it does not provide the protection expected. Access by Intruders Intruders may enter through an unprotected access point, circumvent a sensing device, evade detection by moving through an area of insufficient coverage, disconnect a warning device, or interfere with or prevent the proper operation of the system. [. . . ]

DISCLAIMER TO DOWNLOAD THE USER GUIDE DSC ALEXOR PC9155




Click on "Download the user Manual" at the end of this Contract if you accept its terms, the downloading of the manual DSC ALEXOR PC9155 will begin.

 

Copyright © 2015 - manualRetreiver - All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.