Xmark Corporation R2R 用户手册

下载
页码 33
EXI HALO User Manual
Halo User Manual R4
EXI Wireless Systems Inc.
Page 3 of 33
June, 1999
Table of Contents
P 1.
LIMITED WARRANTY ........................................................................................................................ 5
P 2.
SYSTEM MAINTENANCE .................................................................................................................. 5
P 3.
INTENDED AUDIENCE ....................................................................................................................... 6
P 4.
SCOPE...................................................................................................................................................... 6
P 5.
ABOUT HALO INFANT PROTECTION SYSTEM ........................................................................ 7
P 6.
ACCESS LEVELS.................................................................................................................................. 7
P 7.
SYSTEM CONVENTIONS ................................................................................................................... 8
P 8.
SYSTEM SUPPORT .............................................................................................................................. 8
1.
SYSTEM INTRODUCTION ................................................................................................................. 9
1.1.
S
YSTEM 
C
OMPONENTS
........................................................................................................................... 9
1.2.
T
ERMS USED IN THIS DOCUMENT
............................................................................................................ 9
1.3.
C
OMPUTER 
D
ISPLAY 
C
ONVENTIONS
.................................................................................................... 10
2.
USER LEVEL ....................................................................................................................................... 11
2.1.
A
DMITTING A 
P
ATIENT
.......................................................................................................................... 11
2.2.
D
ISCHARGING A 
P
ATIENT
..................................................................................................................... 14
2.3.
S
ILENCING AND 
A
CCEPTING 
A
LARMS
.................................................................................................. 16
3.
SUPERVISOR LEVEL........................................................................................................................ 19
3.1.
A
CCESSING 
S
UPERVISOR 
L
EVEL
........................................................................................................... 19
3.2.
E
XITING 
S
UPERVISOR 
L
EVEL
................................................................................................................ 20
4.
ACTIVITY LOG MANAGEMENT.................................................................................................... 21
4.1.
A
CTIVITY 
L
OGS
..................................................................................................................................... 21
4.2.
N
AVIGATING THE ACTIVITY LOG
........................................................................................................... 22
4.3.
A
DDING A 
S
UPERVISOR ANNOTATION TO AN ALARM
............................................................................ 22
4.4.
B
ACKING UP 
A
CTIVITY 
L
OGS
................................................................................................................ 23
5.
MANAGING TAGS.............................................................................................................................. 24
5.1.
T
AGS
..................................................................................................................................................... 24
5.2.
A
DDING A NEW 
P-T
AG TO THE SYSTEM
................................................................................................ 25
5.3.
D
ELETING A 
P-T
AG FROM THE SYSTEM
................................................................................................ 26
5.4.
D
ISABLING A 
P-T
AG
............................................................................................................................. 27
5.5.
U
NASSIGNING A 
P-T
AG
........................................................................................................................ 27
5.6.
E
DITING A 
P-T
AG 
R
ECORD
................................................................................................................... 28
5.7.
P
RINTING
.............................................................................................................................................. 28
6.
MANAGING SYSTEM USERS.......................................................................................................... 29
6.1.
A
DDING A NEW USER TO THE SYSTEM
.................................................................................................. 30
6.2.
D
ELETING A USER FROM THE SYSTEM
.................................................................................................. 31
6.3.
D
ISABLING A SYSTEM USER
.................................................................................................................. 31
6.4.
E
DITING A SYSTEM USER ACCESS
.......................................................................................................... 31
7.
SHUTTING AND RESTARTING THE SYSTEM........................................................................... 32
7.1.
S
HUTTING DOWN
.................................................................................................................................. 32
7.2.
R
ESTARTING THE SYSTEM
..................................................................................................................... 32