EasyManua.ls Logo

DH Instruments PPC3 - Page 81

Default Icon
160 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
3. OPERATION
Page 71 © 2002-2007 DH Instruments, a Fluke Company
could require extensive reconfiguration by the user and might cause invalid
readings and behavior. For these reasons, depending upon the application in
which PPC3 is being used, it may be desirable to restrict access to certain
functions for certain users. The user level function provides a means of restricting
access to certain functions. Four different levels of security are available.
Access to changing security levels can be left open, or be protected by a password.
Security Levels
The security levels are structured to support typical operating environments as
follows:
None This level is intended for use only by the system manager and/or
calibration facility. It allows access and editing in all areas including
critical metrological information.
Low Low security is designed to protect the specific metrological
information and SYSTEM DIAGNOSTIC AND MAINTENANCE
functions of the system against accidental alteration. It is intended for
an advanced operator performing many different tasks. Low security
is the default user level setting.
Medium Medium security is designed to protect specific metrological
information in the system and to assure that the PPC3 is operated
using consistent operational parameters.
High High security is designed to protect all operating parameters. It is
intended to minimize operator choices, for example to perform
repeated identical calibrations under consistent conditions.
PPC3 is delivered with the security level set at low to avoid inadvertent
altering of critical internal settings but with access to changing security
levels unrestricted. It is recommended that the low security level be
maintained at all times. If there is a risk of unauthorized changing of the
security level, changing authority should be password protected
(see OPERATION of this section).
The security levels are structured to support typical levels of operation as shown
in Table 12. Specifically, the security levels prevent execution of the functions
accessed by the key strokes marked by “•”:

Table of Contents

Related product manuals