Icom IC-F5123D Operating Guide - Page 3

Table Of Contents

Page 3 highlights

TABLE OF CONTENTS IMPORTANT i VOICE CODING TECHNOLOGY i TABLE OF CONTENTS ii 1 PREPARATION 1 ■ Programmable function keys 1 2 MDC 1200 OPERATION 2-3 ■ MDC 1200 system operation 2 ■ Receiving a call 2 ■ Transmitting a call 3 3 IDAS OPERATION 4-16 ■ IDAS operation 4 ■ IDAS Trunk operation 4 ■ Receiving a call 4 ■ Transmitting a call 10 ■ Transmitting Position data 15 ■ Transmitting Status message 15 ■ Sounding a Horn 15 ■ Connecting a Printer 16 ■ Using Voice Encryption 16 ii

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20

ii
TABLE OF CONTENTS
IMPORTANT
..........................................................................
i
VOICE CODING TECHNOLOGY
..........................................
i
TABLE OF CONTENTS
........................................................
ii
1 PREPARATION
................................................................
1
Programmable function keys
........................................
1
2 MDC 1200 OPERATION
..............................................
2–3
MDC 1200 system operation
........................................
2
Receiving a call
............................................................
2
Transmitting a call
.........................................................
3
3 IDAS OPERATION
....................................................
4–16
IDAS operation
.............................................................
4
IDAS Trunk operation
...................................................
4
Receiving a call
............................................................
4
Transmitting a call
.......................................................
10
Transmitting Position data
...........................................
15
Transmitting Status message
.....................................
15
Sounding a Horn
........................................................
15
Connecting a Printer
..................................................
16
Using Voice Encryption
..............................................
16