Uniden BC898T Telephone User Manual


 
24
Holding On a Single Talk Group
To hold on an active talk group when scanning or searching, press HOLD U. The BC898T
stops scanning and holds on the current trunking system. It only receives transmissions on
the talk group that was active when you pressed HOLD U.
To select a talk group to hold on when that group is not active, while ID scanning or ID
searching the system, press HOLD U. Then, either enter the ID or (if you have stored the
ID) scroll to the ID you want to hold on.
Locking Out Talk Groups
Like conventional scanning, you can lock out unwanted talk group traffic on trunking
systems. This is particularly important if you are ID searching a trunking system, as many
systems share both voice traffic (that you usually want to hear) with some data traffic from
water meter systems, door alarms, traffic signals and other data sources that you don’t
want to hear. You can lock out up to 200 talk group ID’s at the same time.
To lock out a talk group, press L/O when the scanner stops on that group. Or, if you have
stored the talk group in an ID list, select that ID and press L/O.
Reviewing Locked Out Talk Group ID’s
You can confirm which talk group ID’s are locked out in the scanner.
To review locked out talk group ID’s, hold down L/O for about 2 seconds. The locked-out
talk group ID’s appear.
Restoring All Locked Out Talk Group ID’s
To restore all locked out talk group ID’s, hold down L/O for about 2 seconds.
EDACS Blockout
This is a powerful form of lockout that is only available for EDACS systems. EDACS
Blockout lets you lock out entire agencies or fleets, not just individual talk groups.
To use blockout, while scanning an EDACS system, press HOLD U.
Setting the Attenuator
If you are near a very strong signal source, the signal can overload the scanner’s RF front
end, causing poor audio quality or missed reception. Repeatedly press ATT until
ATT
appears (to turn the attenuator on) or until
ATT disappears (to turn the attenuator off).
ID Lockout
Like conventional scanning, it’s possible to lock out unwanted traffic. This is particularly
important in trunked systems because in many areas water meters, door alarms, traffic
signals, and other mechanical devices are assigned ID’s just like other users. Also some