©
National Instruments Corporation
I-1
Index
A
access levels and privileges, 7-1
See also security.
defaults (table), 7-13
finding access levels, 7-15
finding environment access privileges, 7-15
modifying
access privileges, 7-22
list of available user access levels, 7-19
Access Levels dialog box, 7-15
Acknowledge Alarm VI, A-5
adding network tags, 3-7
alarm attributes, 3-3
alarm limit, 5-1
alarm priority, 5-2
alarm states, 5-1
alarm summary
applying security (activity), 7-24
building (activity), 5-3
displaying, 5-2
purpose and use, 5-2
alarms
ACK button, 5-6
activity, 5-7
Auto Ack on Normal option, 5-6
User Must Ack option, 5-6
configuring logging and printing, 5-10
defining group of tags for alarming, 3-21
Event Configuration dialog box
event logging and printing selections
illustration, 5-10
log and print format selections, 5-12
purpose and use, 1-6, 5-1
tag configuration, 3-31
alarm deadband on analog tags, 3-36
analog tags, 3-34
Auto Ack on Normal option, 3-37
configuration attributes (table), 3-31
discrete tags, 3-35
enabling alarms, 3-34
keeping alarms unacknowledged, 3-37
string tags, 3-36
types of alarms, 3-31
User Must Ack option, 3-38
Acknowledge Alarm, A-5
effect on startup and shutdown, 4-24
Get Alarm Summary Status, A-6
locating, A-4
purpose and use, 4-16, 4-20
Read Alarm Summary, A-7
Read Event History, A-11
Read Tag Alarm, A-15
Alarms Configuration Attributes (table), 3-31
Alignment ring, 2-3
analog tags
alarm configuration, 3-34
alarm deadband, 3-36
creating, 3-5
purpose and use, 3-10
scaling, 3-27
analog tag scaling dialog box, 3-27
assigning units, 3-28
linear scaling, 3-27
square root scaling, 3-28