Welcome to ECBAY
wireless home alarm system/burglar alarm
wireless home alarm system/burglar alarm

Detailed Product Description


 

Basic configurations:

A wireless wide-angle infrared detector
A host
A set of wireless magnetic detector
Two wireless remote control
Wired a small alarm
A 12V power
Telephone lines, each line of a row
A user manual  

Features:

1. Stand model with a variety of free choice in all cases the use of docking facilities, Stand model with independent, models are as follows: closed model, the immediate mode, delay mode, emergency mode, intelligent mode and multi-Kam Die
2. Malicious interference prevention function, the host with the automatic identification of wireless interference, have been automatically identified as the host signal interference break after the whistle will be sounded;
3. Anti-break function. With this feature turned on, all the wireless remote control will not be able to withdraw from a defended position;
4. Intelligent micro-computer automatic dial-up alarm, that can be allocated to 6 groups any different alarm calls to inform the master of the situation;
5. Contact id and stability of the use of Po and other agreements, with the use of computer networking Alarming Center. alarming Center received a report
After the alarm automatically transferred the case;
6. Emergency help with wireless functionality, wireless cloth from a defended position function, and can be carried out through random telephone remote control of the Department, monitor the situation and deployment from a defended position;
7. To the default audio alarm and silent alarm;
8. Grab line alarm function, when someone attempted to steal a telephone call occupied, the system will automatically hang up the other phone line to getcenter owner and the police;
9. Confidential and can be set up any password 4;
10. Stand-independent programming model and Stand-tone;
11. Audio playback system, and power-down will not be lost;
12. Phone line fault tips (by cutting telephone lines and short-circuit). In the deployed state, the whistle sounded;
13. Intelligent learning code;
14. Message validation results;
15. System in each re-boot automatically when the memory state at the time of the last shutdown (garrison or deployed);
16. Compatible with other host functions

Ads by Google


About Us | Contact Us | Help | Terms & Conditions
Hot Products: A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | 0-9
Copyright Notice @ 2008-2022 ECBAY Limited and/or its subsidiaries and licensors. All rights reserved.