. .
. .
.
...‘..
.+ 2..-
:. . ..
. .. .:-
INTRODUCTION
c This 900 Megahertz Cordless Telephone utilizes state of the art technology. It operates on the
frequency | band. There are three main advantages | to this |
technology: | — More channels |
|
—Clear reception
—Interference free
●A cordless telephone offers convenience, ease and mobility during telephone communications. Its use, however, is dependent upon the availability of AC power. Any interruption of electrical power at your location would prevent your placing or receiving calls. Therefore, a cordless telephone should not be installed as
the only phone in your home.
●“Full ~wer” means that your telephone is designed to operate at the maximum power allowed by the Federal Communications Commission (FCC).
“The range at which you can use the cordless Handset away from the Base is dependent upon many factors. The telephone Base is like a radio transmitter in that it transmits telephone line signals via radio waves to the Handset. Therefore, the location of the Base is important in order to obtain maximum Handset range for the power allowed.
In some areas, installing the Base on the second floor will provide greater range than a ground floor installation. Reception can be adversely affected by such things as aluminum siding, appliances (refrigerators, stove, etc.), insulation foil backing, heating ducts and other metal construction which acts to shield radio signals.
Atmospheric conditions also play an important role in the performance of your cordless telephone.
●Always keep the Base antenna raised.
●Above all, keep within the range of the Base.
Whenever you place the handset on the base unit, the unit automatically verifies its security code. This code helps to avoid unauthorized use of your telephone line by another cordless telephone in your area.
Note: Whenever a power outage occurs, batteries are replaced, or communication is lost between handset and base, the handset may have to be returned to the base for
4
:B. cor~iess
●
●Telephone
● | Characteristics |
● | |
● |
|
● |
|
● |
|
● |
|
● |
|
● |
|
● |
|
● |
|
● |
|
● |
|
● |
|
● |
|
● |
|
● |
|
● |
|
● |
|
● |
|
● |
|
● |
|
9 |
|
● |
|
● |
|
● |
|
● |
|
● |
|
● |
|
● |
|
● |
|
● |
|
● |
|
● |
|
● |
|
● |
|
● |
|
● |
|
● |
|
● |
|
● |
|
● |
|
● |
|
● |
|
● |
|
● |
|
● |
|
● |
|
● |
|
● |
|
● |
|
● |
|
● |
|
● |
|
● |
|
s | C. Setting the |
● | Security |
● | |
● | Code |
● | |
● |
|
● |
|
● |
|
1 |
|
● |
|
● |
|
. .