Chevrolet Spark Owner Manual (GMNA-Localizing-U.S./Canada-14622955) -
2021 - CRC - 8/17/20
18
Keys, Doors, and Windows
Press the touch pad and lift to open or,
if equipped, pull the handle and lift up.
To lock the liftgate, press
Q
on the power
door lock switch or on the RKE transmitter.
If equipped, lock using the key in the key
cylinder. See
or
Remote Keyless Entry (RKE) System
Operation (Keyless Access)
.
When closing the liftgate, close from the
center so that it fully latches.
Vehicle Security
This vehicle has theft-deterrent features;
however, they do not make the vehicle
impossible to steal.
Vehicle Alarm System
This vehicle has an anti-theft alarm system.
The security light, on the instrument panel
near the windshield, indicates the status of
the system:
Off :
Alarm system is disarmed.
On Solid :
Vehicle is secured during the
delay to arm the system.
Fast Flash :
Vehicle is unsecured. A door, the
hood, or the liftgate is open.
Slow Flash :
Alarm system is armed.
Arming the Alarm System
1. Turn off the vehicle.
2. Lock the vehicle with one of the
following:
.
Use the RKE transmitter.
.
With a door open, press
Q
on the
interior.
3. After 30 seconds the alarm system will
arm, and the indicator light will begin to
slowly flash indicating the alarm system
is operating. Pressing
Q
on the RKE
transmitter a second time will bypass
the 30-second delay and immediately
arm the alarm system.
The vehicle alarm system will not arm if the
doors are locked with the key.
If the driver door or liftgate is opened
without first unlocking with the RKE
transmitter, the horn will chirp and the
lights will flash to indicate a pre-alarm.
If the vehicle is not started, or the door is
not unlocked by pressing
K
on the RKE
transmitter during the 10-second pre-alarm,
the alarm will be activated.
The alarm will also be activated if the
passenger door, the liftgate, or the hood is
opened without first disarming the system.
When the alarm is activated, the turn
signals flash and the horn sounds for about
30 seconds. The alarm system will then
re-arm to monitor for the next unauthorized
event.