Icom IC-F5123D Operating Guide - Page 3
Table Of Contents
View all Icom IC-F5123D manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 3 highlights
TABLE OF CONTENTS IMPORTANT i VOICE CODING TECHNOLOGY i TABLE OF CONTENTS ii 1 PREPARATION 1 ■ Programmable function keys 1 2 MDC 1200 OPERATION 2-3 ■ MDC 1200 system operation 2 ■ Receiving a call 2 ■ Transmitting a call 3 3 IDAS OPERATION 4-16 ■ IDAS operation 4 ■ IDAS Trunk operation 4 ■ Receiving a call 4 ■ Transmitting a call 10 ■ Transmitting Position data 15 ■ Transmitting Status message 15 ■ Sounding a Horn 15 ■ Connecting a Printer 16 ■ Using Voice Encryption 16 ii
ii
TABLE OF CONTENTS
IMPORTANT
..........................................................................
i
VOICE CODING TECHNOLOGY
..........................................
i
TABLE OF CONTENTS
........................................................
ii
1 PREPARATION
................................................................
1
■
Programmable function keys
........................................
1
2 MDC 1200 OPERATION
..............................................
2–3
■
MDC 1200 system operation
........................................
2
■
Receiving a call
............................................................
2
■
Transmitting a call
.........................................................
3
3 IDAS OPERATION
....................................................
4–16
■
IDAS operation
.............................................................
4
■
IDAS Trunk operation
...................................................
4
■
Receiving a call
............................................................
4
■
Transmitting a call
.......................................................
10
■
Transmitting Position data
...........................................
15
■
Transmitting Status message
.....................................
15
■
Sounding a Horn
........................................................
15
■
Connecting a Printer
..................................................
16
■
Using Voice Encryption
..............................................
16