Auto Dialer, 1 Trigger, 1 Voice Message Auto Dialer, 1 Trigger, 1 Voice Message
Item No:LK-100S1

Auto Dialer, 1 Trigger, 1 Voice Message

File download

Item No. LK-100S1.

• One Trigger, One Voice message
• Store up to 8 telephone numbers
• Battery free computerized chip records voice message(s), each 20 seconds maximum, and phone numbers each 25 digits maximum.
• With Panic Button for emergency help
• Intrusions recorded and reported on LCD
• With alarm output dry contact


Specifications:

Power Input: DC11 ~ 17V
- Power consumption: Standby - 35mA, Operation - 80mA
- Alarm Inputs: NO (Normal Open) or NC (Normal Close)
- Number of Phone Number: 8 (landlines or cellphones)
- Time of Voice Message(s): 20 seconds maximum
- Single alarm input, single voice message
- Alarm Output Method: dry contacts
- Dimensions: 210W x 125H x 34D mm

 

The Auto Dialer with 1 Trigger and 1 Voice Message capability is a powerful tool that combines security and communication functionalities. Designed to provide a reliable and efficient means of reporting intrusions and emergencies, this device offers several features that enhance its effectiveness.

With the ability to store up to 8 telephone numbers, the Auto Dialer ensures that key contacts are readily available when needed. Whether landlines or cellphones, these numbers can be easily programmed into the device, allowing for quick and seamless communication during critical situations.

In terms of specifications, the Auto Dialer operates with a power input of DC11 ~ 17V. Its power consumption during standby mode is a mere 35mA, while operation requires 80mA, ensuring efficient energy usage.

The device supports both NO (Normal Open) and NC (Normal Close) alarm inputs, providing flexibility to accommodate different types of alarm systems and sensors. This versatility allows for easy integration into existing security setups.

With dimensions of 210mm in width, 125mm in height, and 34mm in depth, the Auto Dialer is compact and space-efficient. This design ensures easy installation and integration into various security configurations.