National Instruments Vacuum Cleaner 322391A 01 User Manual

Lookout Operator’s Manual  
Lookout Operator’s Manual  
August 1999 Edition  
Part Number 322391A-01  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Important Information  
Warranty  
The media on which you receive National Instruments software are warranted not to fail to execute programming  
instructions, due to defects in materials and workmanship, for a period of 90 days from date of shipment, as evidenced  
by receipts or other documentation. National Instruments will, at its option, repair or replace software media that do not  
execute programming instructions if National Instruments receives notice of such defects during the warranty period.  
National Instruments does not warrant that the operation of the software shall be uninterrupted or error free.  
A Return Material Authorization (RMA) number must be obtained from the factory and clearly marked on the outside  
of the package before any equipment will be accepted for warranty work. National Instruments will pay the shipping costs  
of returning to the owner parts which are covered by warranty.  
National Instruments believes that the information in this document is accurate. The document has been carefully  
reviewed for technical accuracy. In the event that technical or typographical errors exist, National Instruments reserves  
the right to make changes to subsequent editions of this document without prior notice to holders of this edition. The  
reader should consult National Instruments if errors are suspected. In no event shall National Instruments be liable for  
any damages arising out of or related to this document or the information contained in it.  
EXCEPT AS SPECIFIED HEREIN, NATIONAL INSTRUMENTS MAKES NO WARRANTIES, EXPRESS OR IMPLIED, AND SPECIFICALLY DISCLAIMS  
ANY WARRANTY OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS RIGHT TO RECOVER DAMAGES CAUSED  
BY FAULT OR NEGLIGENCE ON THE PART OF NATIONAL INSTRUMENTS SHALL BE LIMITED TO THE AMOUNT THERETOFORE PAID BY THE  
CUSTOMER. NATIONAL INSTRUMENTS WILL NOT BE LIABLE FOR DAMAGES RESULTING FROM LOSS OF DATA, PROFITS, USE OF PRODUCTS,  
OR INCIDENTAL OR CONSEQUENTIAL DAMAGES, EVEN IF ADVISED OF THE POSSIBILITY THEREOF. This limitation of the liability of  
National Instruments will apply regardless of the form of action, whether in contract or tort, including negligence.  
Any action against National Instruments must be brought within one year after the cause of action accrues. National  
Instruments shall not be liable for any delay in performance due to causes beyond its reasonable control. The warranty  
provided herein does not cover damages, defects, malfunctions, or service failures caused by owner’s failure to follow  
the National Instruments installation, operation, or maintenance instructions; owner’s modification of the product;  
owner’s abuse, misuse, or negligent acts; and power failure or surges, fire, flood, accident, actions of third parties,  
or other events outside reasonable control.  
Copyright  
Under the copyright laws, this publication may not be reproduced or transmitted in any form, electronic or mechanical,  
including photocopying, recording, storing in an information retrieval system, or translating, in whole or in part, without  
the prior written consent of National Instruments Corporation.  
Trademarks  
Lookout, natinst.com, and National Instrumentsare trademarks of National Instruments Corporation.  
Product and company names mentioned herein are trademarks or trade names of their respective companies.  
WARNING REGARDING USE OF NATIONAL INSTRUMENTS PRODUCTS  
(1) NATIONAL INSTRUMENTS PRODUCTS ARE NOT DESIGNED WITH COMPONENTS AND TESTING  
FOR A LEVEL OF RELIABILITY SUITABLE FOR USE IN OR IN CONNECTION WITH SURGICAL IMPLANTS  
OR AS CRITICAL COMPONENTS IN ANY LIFE SUPPORT SYSTEMS WHOSE FAILURE TO PERFORM CAN  
REASONABLY BE EXPECTED TO CAUSE SIGNIFICANT INJURY TO A HUMAN.  
(2) IN ANY APPLICATION, INCLUDING THE ABOVE, RELIABILITY OF OPERATION OF THE SOFTWARE  
PRODUCTS CAN BE IMPAIRED BY ADVERSE FACTORS, INCLUDING BUT NOT LIMITED TO  
FLUCTUATIONS IN ELECTRICAL POWER SUPPLY, COMPUTER HARDWARE MALFUNCTIONS,  
COMPUTER OPERATING SYSTEM SOFTWARE FITNESS, FITNESS OF COMPILERS AND DEVELOPMENT  
SOFTWARE USED TO DEVELOP AN APPLICATION, INSTALLATION ERRORS, SOFTWARE AND  
HARDWARE COMPATIBILITY PROBLEMS, MALFUNCTIONS OR FAILURES OF ELECTRONIC  
MONITORING OR CONTROL DEVICES, TRANSIENT FAILURES OF ELECTRONIC SYSTEMS (HARDWARE  
AND/OR SOFTWARE), UNANTICIPATED USES OR MISUSES, OR ERRORS ON THE PART OF THE USER OR  
APPLICATIONS DESIGNER (ADVERSE FACTORS SUCH AS THESE ARE HEREAFTER COLLECTIVELY  
TERMED “SYSTEM FAILURES”). ANY APPLICATION WHERE A SYSTEM FAILURE WOULD CREATE A RISK  
OF HARM TO PROPERTY OR PERSONS (INCLUDING THE RISK OF BODILY INJURY AND DEATH) SHOULD  
NOT BE RELIANT SOLELY UPON ONE FORM OF ELECTRONIC SYSTEM DUE TO THE RISK OF SYSTEM  
FAILURE. TO AVOID DAMAGE, INJURY, OR DEATH, THE USER OR APPLICATION DESIGNER MUST TAKE  
REASONABLY PRUDENT STEPS TO PROTECT AGAINST SYSTEM FAILURES, INCLUDING BUT NOT  
LIMITED TO BACK-UP OR SHUT DOWN MECHANISMS. BECAUSE EACH END-USER SYSTEM IS  
CUSTOMIZED AND DIFFERS FROM NATIONAL INSTRUMENTS' TESTING PLATFORMS AND BECAUSE A  
USER OR APPLICATION DESIGNER MAY USE NATIONAL INSTRUMENTS PRODUCTS IN COMBINATION  
WITH OTHER PRODUCTS IN A MANNER NOT EVALUATED OR CONTEMPLATED BY NATIONAL  
INSTRUMENTS, THE USER OR APPLICATION DESIGNER IS ULTIMATELY RESPONSIBLE FOR VERIFYING  
AND VALIDATING THE SUITABILITY OF NATIONAL INSTRUMENTS PRODUCTS WHENEVER NATIONAL  
INSTRUMENTS PRODUCTS ARE INCORPORATED IN A SYSTEM OR APPLICATION, INCLUDING, WITHOUT  
LIMITATION, THE APPROPRIATE DESIGN, PROCESS, AND SAFETY LEVEL OF SUCH SYSTEM OR  
APPLICATION.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Conventions  
The following conventions appear in this manual:  
»
The » symbol leads you through nested menu items and dialog box options  
to a final action. The sequence File»Page Setup»Options directs you to  
pull down the File menu, select the Page Setup item, and select Options  
from the last dialog box.  
This icon denotes a note, which alerts you to important information.  
This icon denotes a caution, which advises you of precautions to take to  
avoid injury, data loss, or a system crash.  
bold  
Bold text denotes items that you must select or click on in the software,  
such as menu items and dialog box options. Bold text also denotes  
parameter names.  
italic  
Italic text denotes variables, emphasis, a cross reference, or an introduction  
to a key concept. This font also denotes text that is a placeholder for a word  
or value that you must supply.  
monospace  
Text in this font denotes text or characters that you should enter from the  
keyboard, sections of code, programming examples, and syntax examples.  
This font is also used for the proper names of disk drives, paths, directories,  
programs, subprograms, subroutines, device names, functions, operations,  
variables, filenames and extensions, and code excerpts.  
monospace bold  
Bold text in this font denotes the messages and responses that the computer  
automatically prints to the screen. This font also emphasizes lines of code  
that are different from the other examples.  
monospace italic  
Italic text in this font denotes text that is a placeholder for a word or value  
that you must supply.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 1  
Installing Lookout  
Citadel Database Settings................................................................................1-8  
Log Alarms Setting..........................................................................................1-8  
Panel Navigation Arrows ................................................................................1-8  
Chapter 2  
Lookout Workspace.........................................................................................2-5  
Control Panels .................................................................................................2-5  
Alarm Window................................................................................................2-7  
Operator Input and Navigation ......................................................................................2-7  
Virtual Keypad ................................................................................................2-7  
Virtual Keyboard.............................................................................................2-8  
© National Instruments Corporation  
v
Lookout Operator’s Manual  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Contents  
Process File ..................................................................................................... 2-8  
Source Code File............................................................................................. 2-8  
Chapter 3  
Alarms»Print ................................................................................................... 3-14  
Alarms»Select All........................................................................................... 3-16  
Alarms»Deselect All....................................................................................... 3-16  
Alarms»Acknowledge..................................................................................... 3-16  
Alarms»Acknowledge All............................................................................... 3-17  
Alarms»Properties........................................................................................... 3-17  
Lookout Operator’s Manual  
vi  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Contents  
Run»Add..........................................................................................................3-19  
Run»Delete......................................................................................................3-20  
Help Commands ............................................................................................................3-20  
Help»Contents .................................................................................................3-20  
Appendix A  
Technical Support Resources  
Glossary  
Index  
Figures  
Figure 1-1.  
Figure 2-1.  
Figure 3-1.  
System Options Dialog Box..................................................................1-7  
The Lookout Screen ..............................................................................2-4  
Serial Port Settings Dialog Box.............................................................3-7  
Table  
Table 3-1.  
Dialing Prefix Default Settings .............................................................3-10  
© National Instruments Corporation  
vii  
Lookout Operator’s Manual  
Download from Www.Somanuals.com. All Manuals Search And Download.  
1
Installing Lookout  
This chapter explains how to install and configure the runtime Lookout  
software.  
This manual explains how to install, configure, and use the Lookout  
runtime software. It assumes that you are already familiar with your  
operating system.  
Hardware and Software Requirements  
Lookout requires the following:  
Pentium class PC running at 90 MHz or faster  
At least 32 MB RAM  
45 MB free disk space, plus possibly 100 MB or more, depending on  
how much data you intend to log to the Lookout database, Citadel.You  
should also have about 50 MB of disk space for file swapping on  
Windows NT computers.  
Windows 98/95 or Windows NT version 4 or later  
Network card and TCP/IP networking installed on the computers you  
want to connect, if you intend to take advantage of Lookout  
networking  
Because Lookout can run 24 hours a day, your computer should have some  
form of AC power surge protection. An uninterruptible power supply  
(UPS) provides the ultimate protection. A UPS provides complete isolation  
between the AC power source and the computer and has backup battery  
power if there are blackouts and brownouts. A quality surge protector will  
protect your computer from most electrical surges and spikes if you do not  
need battery backup.  
Lookout is Y2K compliant and requires no special considerations for the  
year 2000.  
© National Instruments Corporation  
1-1  
Lookout Operator’s Manual  
Download from Www.Somanuals.com. All Manuals Search And Download.  
         
Chapter 1  
Installing Lookout  
TCP/IP Networking  
You must be properly set up on a network with TCP/IP protocols installed  
if you want to use the networking capabilities of Lookout 4. If TCP/IP is  
not working properly on your computer, consult your system administrator.  
Installing Lookout  
Installing from the CD  
1. Before installing, make sure you have shut down all applications  
that may currently be using ODBC. Such applications include  
spreadsheets, word processors, database programs, MS Query, and  
similar applications.  
2. Insert the Lookout CD into your CD drive.  
3. The Lookout CD-ROM has autorun capability. If for some reason the  
autorun fails to start the CD installation routine, click on the Start icon  
in the taskbar and select Run.  
4. Enter N:\SETUPwhere Nrepresents your CD-ROM drive. Then select  
OK.  
Lookout installs an ODBC driver as a part of its database capability.  
5. Follow the remaining instructions to complete the Lookout  
installation.  
Installing Lookout from Floppy Diskettes  
If the computer you want to install Lookout on does not have a CD-ROM  
drive, follow these instructions for installing the software:  
1. Prepare about two dozen blank diskettes: 3.5-inch, 1.4MB. Label each  
diskette as Disk1, Disk2, and so on.  
2. On another computer with a CD-ROM drive and diskette drive, copy  
the files in the individual DiskN subdirectories on the CD onto the  
appropriately labeled 3.5-inch floppy diskette. Do not copy the DiskN  
directory itself onto your floppies. Copy only the contents of each  
directory.  
3. On the computer where you want to install Lookout, insert the diskette  
labeled Disk1 and run the setup.exeprogram from the diskette.  
4. Follow the installation instructions on the screen.  
Lookout Operator’s Manual  
1-2  
Download from Www.Somanuals.com. All Manuals Search And Download.  
       
Chapter 1  
Installing Lookout  
Registering Lookout  
Be sure to register your Lookout package to receive your permanent unlock  
code. As an unregistered package, Lookout is limited to 50 I/O points and  
one client connection and only runs for 30 days.  
If you are installing a free client run-time version of Lookout only, you do  
not have to register. If you are installing Lookout as an upgrade to an earlier  
version, you have already provided registration information, and Lookout  
opens with a request for you to log in.  
In either of those cases you can skip the registration instructions.  
If this is your first installation of a server or development version of  
Lookout on the computer you are using, or if you have any lost or corrupted  
your registration information, then the first time you launch Lookout,  
it prompts you for registration information.  
Note When you register Lookout, you unlock it for permanent use at your appropriate I/O  
count. If you do not register Lookout by the end of the 30 day period, it lapses to a demo  
system. You must complete the license agreement and mail or fax a copy of the agreement  
to National Instruments in order to register Lookout. Upon receipt of the registration form,  
National Instruments generates a key code to unlock Lookout and faxes or mails it to you.  
Lookout requires a hardware key in some countries. Contact National Instruments if  
you are not sure whether your system requires a hardware key. If you were supplied a key  
with Lookout, be sure to plug it into the parallel port on your computer before activating  
Lookout.  
Starting Lookout for the First Time  
1. Launch Lookout by selecting Start»Programs»National  
Instruments Lookout»Lookout.  
A dialog box appears, asking if you to register Lookout. If you are  
ready to register Lookout, click on OK. The registration dialog box  
appears.  
© National Instruments Corporation  
1-3  
Lookout Operator’s Manual  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Chapter 1  
Installing Lookout  
2. Enter your name in the Name field.  
3. Enter the Organization name exactly as it appears on the key code fax  
sent in response to your registration, including punctuation marks.  
This text is used in combination with the key code, and so it must be  
exact.  
(If you have not yet received your key code from National Instruments,  
you can enter your registration data later. Select OK and Lookout will  
inform you that you have not registered your package yet. Select OK  
again until Lookout launches.)  
4. Enter the Serial Number of your package. (This can be found on your  
registration form.)  
5. Enter your 12-character Keycode. The key code is not case sensitive  
and you can leave the hyphens out if desired. Notice that there are no  
spaces near the hyphens.  
6. After completing the entries, press <Enter> or select OK.  
If you enter the proper information correctly, Lookout appears on your  
screen with no process running.  
Lookout Operator’s Manual  
1-4  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 1  
Installing Lookout  
If you are certain that you typed the information correctly and Lookout  
does not accept it, call the National Instruments technical support line  
for help.  
Changing Registration Information  
If you want to change the number of Lookout I/O points you are using, or  
make other changes in system capabilities, National Instruments must send  
you a new Lookout keycode.  
To change your registration information, select Options»System»Change  
Registration Info. Enter the new keycode in the appropriate field to unlock  
your additional Lookout functionality.  
Adding Client Connections  
You are limited in the number of client connections you are allowed to  
maintain in Lookout. Just as with your I/O license, you must enter a  
keycode.  
Obtain your keycode by faxing your registration form to National  
Instruments, or by calling.  
Unlike the I/O point registration, you can add and remove client licenses  
from any copy of Lookout. If you have a copy of Lookout running a server  
process with two clients connected and need to increase the number of  
client connections to three, you need only get a license for one more client  
connection, and enter that particular keycode in addition to the keycode that  
authorized your first two client connections.  
© National Instruments Corporation  
1-5  
Lookout Operator’s Manual  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Chapter 1  
Installing Lookout  
To add or change client connection information in Lookout, Select  
Options»System from the menu, and click on the Change Client License  
button. The following dialog box appears.  
Click on the Add button. The following dialog box appears.  
Enter your Organization name as you reported it in your registration  
request for a client keycode. Enter the Serial Number of your copy of  
Lookout, and the License Code your received. Click on OK.  
If your registration attempt fails, the following dialog box appears.  
Check to make sure you entered your organization name, serial number,  
and keycode correctly. Contact National Instruments if correcting these  
entries does not fix the problem.  
A newly installed version of Lookout will run with one client connection  
for 30 days before reverting to demo program mode.  
Lookout Operator’s Manual  
1-6  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 1  
Installing Lookout  
Setting System Options  
The first time you open Lookout is a good time to set some of the Lookout  
system options.  
In Lookout, select Options»System from the menu bar. The System  
Options dialog box appears as shown in the following illustration.  
Figure 1-1. System Options Dialog Box  
Note Only users logged on with security levels or 9 or greater can access the System  
Options dialog box.  
Computer Name Setting  
The computer name field shows the network name of the computer you are  
working on. If this field is blank, and you intend to use the networking  
capability of Lookout, you need to check your network settings to make  
sure your computer is properly named for network operations.  
© National Instruments Corporation  
1-7  
Lookout Operator’s Manual  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter 1  
Installing Lookout  
Citadel Database Settings  
The Citadel Database fields set the default destination for Citadel data  
logged by Lookout. All processes running under a single instance of  
Lookout will use this data path to log data to Citadel, unless you override  
this setting when you create the process.  
You set the Default path and the Default computer separately. Use the  
complete path name for the Default path setting, and the fully qualified  
computer name for the Default computer setting.  
Virtual Keyboard Settings  
Lookout features a virtual keyboard that you can access when in run mode  
by clicking on a control that accepts a text or numeric input. You can set  
whether a right-click or a left-click pops up this keyboard in the Virtual  
Keyboard Pops Up On field in the System Options dialog box.  
Log Alarms Setting  
If you have a printer directly connected to your computer, you can direct  
that all alarms can be printed when they occur. Set the Log alarms to box  
in the System Options dialog box to the communications port to which  
your printer is connected. You can also capture a network printer port on  
Windows 98/95 machines. Consult your operating system documentation  
for information on this procedure.  
Panel Navigation Arrows  
Select the Show panel navigation arrows in status bar checkbox if you  
want to use panel navigation arrows. These arrows, located in the right side  
of the status bar, activate control panels in the order in which you last  
accessed them. This feature is most convenient when you have a large  
number of control panels in a process and need to cycle through a subset of  
them several times in a short period of time.  
Security Level Settings  
You may not have access to the security level settings. Consult your  
Lookout system administrator for information on these settings,  
if necessary.  
Lookout Operator’s Manual  
1-8  
Download from Www.Somanuals.com. All Manuals Search And Download.  
         
Chapter 1  
Installing Lookout  
Startup Process File Setting  
If your computer runs Lookout 24 hours a day, you may want to ensure that,  
if the computer temporarily loses power, it will automatically reboot and  
begin executing your processes when power returns.  
To get startup processes, select Options»Startup, and the following dialog  
box appears.  
To add a file to your list of startup processes, click on the Add button.  
A dialog box you can use to browse for a file appears.  
Select the file you want to run when Lookout opens and click on Open.  
You can add as many process files as you want. The files will open in the  
order in which they are entered in the Startup Process Files dialog box.  
To edit a path name to a file, highlight the file name and click on the Edit  
button.  
© National Instruments Corporation  
1-9  
Lookout Operator’s Manual  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Chapter 1  
Installing Lookout  
To make sure Lookout loads and runs when your computer boots or  
reboots, consult your operating system documentation instructions on  
how to set a default startup application.  
Lookout Operator’s Manual  
1-10  
Download from Www.Somanuals.com. All Manuals Search And Download.  
2
Lookout Basics  
This chapter explains how to start and get around within Lookout.  
Basically, you use the mouse, keyboard, touch screens, and similar tools to  
manipulate controls on Lookout control panels. Most of what you do is as  
simple as throwing a switch or adjusting a control knob.  
Some operations require you to use Lookout menu items, covered in  
Chapter 3, Lookout Runtime Menu Commands.  
For specific information regarding the processes you are using, consult  
your Lookout administrator.  
Starting Lookout  
Logging on to Lookout  
Note If you are using Lookout outside of the United States, you may be required to use a  
hardware key. Be sure to plug the key into the parallel port on your computer before  
activating Lookout. If you do not, the program will not run.  
Launch Lookout by selecting Start»Programs»National Instruments  
Lookout»Lookout, or double-click on the Lookout icon.  
When you start or restart Lookout (after having provided registration  
information in your first startup), you are greeted by the log on dialog box,  
as shown in the following illustration.  
© National Instruments Corporation  
2-1  
Lookout Operator’s Manual  
Download from Www.Somanuals.com. All Manuals Search And Download.  
       
Chapter 2  
Lookout Basics  
Your system administrator should have assigned you a user account name  
and password. Enter your user name and password.  
The Idle time field determines how long a period of inactivity Lookout will  
wait before logging off the current user. When set to 0, Lookout leaves the  
current user logged in until that user logs off, a new user logs on, or  
Lookout is shut down.  
The first time you start Lookout, you should see the following display if  
Lookout is not running any processes. In this illustration Lookout does not  
have a process file open. No monitoring or control is taking place.  
If your Lookout administrator has configured Lookout to open a process  
when it runs, your Lookout screen will probably contain your main control  
panel.  
Lookout Operator’s Manual  
2-2  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 2  
Lookout Basics  
Opening a Process File  
1. If you have a Lookout process file available, select the File»Open  
menu item from the Lookout menu bar.  
2. In the File name data field, enter the name of a Lookout process file  
(they have a .l4pfile extension), or choose a process file from the list  
and select OK.  
If you select a valid process file, Lookout opens the file and immediately  
begins executing the process.  
When a process file opens, Lookout makes additional menu selections  
available and displays control panels and the alarm window.  
You can open and run as many process files at one time as you want in  
Lookout, and close them individually or all together. While there is no  
theoretical upper limit to how many process files you can run on one  
computer, in practical terms you may begin to see degraded performance  
with a very large number of processes, depending on your computer’s  
hardware resources and other variables. Running multiple instances of  
Lookout on one computer, or distributing Lookout processes on networked  
computers can increase performance.  
The Lookout Screen  
Lookout first appears on your screen maximized, taking up the entire  
screen.  
Lookout has both edit and run modes. As an operator, you will be using  
Lookout in Run mode only. Figure 2-1 shows a Lookout screen with  
process in place in run mode.  
© National Instruments Corporation  
2-3  
Lookout Operator’s Manual  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Chapter 2  
Lookout Basics  
3
2
1
4
11  
5
6
10  
9
8
7
1
2
3
Menu Bar  
Title Bar  
Process Containing  
Current Active Panel  
4
5
6
Lookout Control Panel  
Alarm Window  
Active Alarms  
7
Control Panel  
Navigation Arrows  
Organization  
10 Time and Date  
11 Minimized Control  
Panel  
8
9
User Logged In  
Figure 2-1. The Lookout Screen  
Title Bar  
The title bar at the top of the Lookout window displays the program name  
and the name of the currently active process. If a control panel is  
maximized, the control panel name appears in the title bar.  
Lookout Operator’s Manual  
2-4  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter 2  
Lookout Basics  
Menu Bar  
Status Bar  
The menu bar displays the currently available menu commands. Some of  
these commands may or may not be available to you, depending on your  
security level.  
The status bar is at the bottom of the Lookout window. When in run mode,  
the status bar is gray and the time and date are displayed on the left end of  
the bar. The account name of the currently logged on operator comes next.  
The company name as entered during registration appears in the middle,  
and the alarm status is on the right end of the status bar.  
Lookout Workspace  
The Lookout workspace is the area between the menu bar and the status  
bar. The workspace is the area in which you view and operate control  
panels. The alarm window also appears within the workspace. You  
organize and arrange control panels in this workspace area.  
The visible workspace on your screen is only a window into the Lookout  
virtual workspace. If control panels or their associated icons are partially  
or completely outside the visible workspace, Lookout automatically  
displays horizontal and vertical scroll bars along the right side and bottom  
of the visible workspace. If scroll bars are visible, you can scroll around in  
the virtual workspace to see all of your control panels.  
Control Panels  
Control panels provide the display area for any collection of switches,  
knobs, bar graphs, digital displays, trend graphs, and other components that  
you want to use to visually monitor and control your operations. Panels can  
be full-screen, minimized, or any size in between. You can move the panels  
around the screen by grabbing the title bar of a panel with the mouse cursor  
and dragging it to a new location. Control panels can also “pop up” when  
an event occurs such as when a pushbutton is pressed or when an alarm is  
activated.  
There are three types of control panels: normal, pop-up, and pop-up with  
no icon. A normal control panel can be maximized, normal size, or  
minimized within the Lookout workspace. A pop-up control panel in either  
© National Instruments Corporation  
2-5  
Lookout Operator’s Manual  
Download from Www.Somanuals.com. All Manuals Search And Download.  
       
Chapter 2  
Lookout Basics  
a pop-up state or minimized. When a pop-up control panel is displayed,  
it remains on top of all other panels until you minimize it.  
Control panels do not have a standard appearance. Some control panels  
may only display information, while others combine control and display  
information. The information displayed always represents the most current  
values available to Lookout through its communications with your I/O  
devices.  
Control panels are windows into your process you use to control equipment  
by flipping switches, pressing buttons, and turning knobs. Individual  
controls, as well as entire control panels may have a security level assigned  
to them. If your security level is below that needed to operate a control or a  
panel, you will not be able to make changes to that control or in that panel.  
If you have permission to access the object, the mouse cursor changes into  
a hand when positioned over the object and the you can adjust and control  
the object.  
Control Access Is Denied  
Control Is Accessible  
If your security level is lower than that of the object, or if you do not have  
permission to work in that process, the cursor changes into the symbol for  
forbidden, and you cannot control the object.  
Lookout can place copies of a control on many different control panels. For  
example, when you turn a knob in one location, all copies of that knob turn  
at the same time, in each place that control is used. The same control object  
may appear differently in each location. A potentiometer may appear as a  
horizontal slide on one panel, a pair of increment/decrement buttons on  
another panel, and a knob on yet another panel.  
Lookout Operator’s Manual  
2-6  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 2  
Lookout Basics  
You can have the same sort of synchronous operation between controls in  
different processes running on your computer, or between controls running  
in processes on different computers in your network. Lookout networking  
makes this possible.  
Alarm Window  
In Figure 2-1 the alarm window is at the bottom of the screen. You can  
choose how the alarm window is displayed by selecting Alarms»Display  
Options. In Figure 2-1 the alarm window is set to display at the bottom of  
the workspace.  
Operator Input and Navigation  
There are numerous methods for you to make setpoint adjustments or  
switch from one control panel to another. These include mouse, trackball,  
touchscreen, and keyboard activated commands.  
When the cursor moves over a controllable object, the cursor turns into a  
hand, indicating you now have control of the object. Controllable objects  
include such things as switches, Pots, and pushbuttons.  
When using a keyboard, the arrow keys move the cursor around the screen.  
The <Tab> key jumps the cursor from one controllable object to another,  
and the <Space> bar acts as the left mouse button, so you can click on a  
controllable object without actually using a mouse.  
You can also use keyboard function keys to control panels and other  
objects, so you can switch between control panels or issue control  
commands just by pressing a function key.  
Your Lookout administrator can provide you with any special instructions  
you need to work with a particular Lookout control panel.  
Virtual Keypad  
When you are in operating mode, you can click on a digital pot control and  
bring up a virtual numeric keypad to enter numeric values, either with a  
mouse or a touch-sensitive screen.  
© National Instruments Corporation  
2-7  
Lookout Operator’s Manual  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter 2  
Lookout Basics  
Virtual Keyboard  
Lookout also has a virtual keyboard you can use with a touch-sensitive  
screen or a mouse.  
To enable the virtual keyboard, select Options»System and then check  
Left Mouse Click or Right Mouse Click in the Virtual Keyboard Pops  
Up section of the dialog box.  
When this feature is enabled, clicking in a data entry field or touching the  
field on a touch-sensitive screen displays the virtual keyboard.  
Lookout Application Files  
Lookout has four unique files for every application: a process file, a source  
code file, a state file, and a security file.  
For Lookout to run a process properly, you must have the process (.l4p)  
and security (.lka) files for that process in your computer.  
If you do not have the source and state files, Lookout can recreate these files  
from the other two.  
Process File  
A process file is a compiled file that contains the Lookout process you want  
to run. Process files are binary files with an .l4p(Lookout Process) file  
name extension.  
Source Code File  
Lookout compiles a source code file to create an .l4pfile. Source code  
files have an .lks(Lookout Source) file name extension.  
Because the binary format of Lookout process files both past and future is  
subject to change for efficiency reasons, you should always keep your .lks  
source files backed up. This is the file you will recompile to open a process  
created in an older version of Lookout with any new version of Lookout  
released in the future.  
You can recompile Lookout source files through the Open command.  
Lookout Operator’s Manual  
2-8  
Download from Www.Somanuals.com. All Manuals Search And Download.  
       
Chapter 2  
Lookout Basics  
To compile a source file inside Lookout, select File»Open. The following  
dialog box opens.  
Set the Files of type to Lookout Source Files (*.lks)and select the  
source file you want to compile.  
State File  
The state file contains the actual values of object data members. These  
values include setpoints and other important data held within and used by  
objects. You might think of the state file as permanent memory for Lookout  
setpoints and real-time trends. Lookout uses the state file to store the  
position of switches, potentiometers, and trend lines. When Lookout first  
loads an application, it reads the appropriate state file to determine what  
state the pots, switches, trend lines, and so on should be in upon startup.  
The state file updates any time you save, close or exit the Lookout  
application file. It can also update on a periodic basis as defined in the  
System Options dialog box. You invoke this dialog box by selecting the  
Options»System menu command. State files have an .l4t(Lookout  
State) file name extension.  
© National Instruments Corporation  
2-9  
Lookout Operator’s Manual  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Chapter 2  
Lookout Basics  
Lookout Windows Services  
Lookout requires three background services that run in Windows outside of  
the Lookout application itself to be running on your computer while it is  
running: Lookout Citadel Server, Lookout Classified Ads, and Lookout  
Time Synchronization. In your Windows NT task manager, these services  
appear as Classifieds, TimeService, and CitadelService. Under  
Windows NT, these services run automatically as NT services. If you need  
to interact with these services, use the NT Services utility, found in  
Start»Settings»Control Panel»Services.  
In Windows 98/95, Lookout installs a services manager during installation,  
denoted by a small lighthouse icon at one end of your Windows task bar,  
as shown in the following illustration.  
When you right-click on this icon you will see the following menu.  
You can start or stop any of the Lookout Windows services using this tool.  
Lookout Operator’s Manual  
2-10  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3
Lookout Runtime Menu  
Commands  
This chapter describes Lookout menu bar pull-down commands available  
in run mode. Some menu items may be disabled, depending on your  
security level.  
Every menu command has a predetermined security level associated with  
it. Only operators whose security levels are equal to or greater than that of  
a particular command can access that menu command. Contact your  
Lookout administrator to find out what security level you have.  
File Commands  
File»New  
Security Level: 9  
Shortcut Keys: <CTRL+N>  
The File»New command is the first step in creating a new process file. It is  
important to notice that you must use the File»Save or File»Save As  
command to save your work and create a new process file.  
File»Open  
Security Level: 8 or member of System Operator group  
Shortcut Keys: <CTRL+O>  
Use the File»Open command to open a process file for execution.  
When you select File»Open, a dialog box pops up that you can use to select  
the current disk drive/directory and scroll through a list of process files.  
Once you find the process file you want to open, click on the file name in  
the file listbox or type the file name and click on the OK button, or just  
double-click on the file name in the listbox.  
© National Instruments Corporation  
3-1  
Lookout Operator’s Manual  
Download from Www.Somanuals.com. All Manuals Search And Download.  
             
Chapter 3  
Lookout Runtime Menu Commands  
If for some reason Lookout refuses to load a .l4pprocess file, you can  
attempt to recompile by opening a Lookout .lksfile. Select Lookout  
Source Files (*.lks) in the Files of Type combo box.  
File»Reopen  
File»Close  
Security Level: 8  
Shortcut Keys: none  
The File»Reopen command reloads the currently executing process from  
disk. This in turn clears all alarms from the alarm window. All trends and  
setpoints, however, retain their previous values.  
Security Level: 8  
Shortcut Keys: none  
The File»Close command halts execution of a currently loaded process file.  
If you are running more than one process, Lookout prompts you to select  
the process you want to close. You can only close one process at a time with  
this command.  
If you made changes to your process file (such as opening the state file to  
recompile) and have not saved your work, Lookout first prompts you to do  
so before letting you close your process.  
If you made no changes, or after you have chosen to save or discard any  
changes you may have made, Lookout then prompts you to make sure you  
The process continues to execute until you answer Yes.  
Lookout Operator’s Manual  
3-2  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Chapter 3  
Lookout Runtime Menu Commands  
Caution The File»Close command shuts down process execution—be sure that this is  
what you want to do before selecting this command. Your Lookout application may be  
controlling critical processes, and shutting it down could cause serious problems.  
File»Close All  
Security Level: 8  
Shortcut Keys: none  
The File»Close All command halts execution of all currently loaded  
processes. Except that it closes all open processes, it works the same way  
the File»Close command does.  
File»Save  
Security Level: 9  
Shortcut Keys: none  
The File»Save command saves the currently executing process to disk.  
Lookout replaces the old process file on disk with a new version that  
reflects all changes made: new or deleted objects, different display  
characteristics, new or modified I/O connections, setpoint adjustments, and  
so on. This includes saving changes to the .l4p, .lks, .l4t, and .lka  
files. See Chapter 2, Lookout Basics, for more information about these files.  
File»Save All  
Security Level: 9  
Shortcut Keys: none  
Operates the same way the File»Save command does, except that it saves  
all open process files.  
File»Print»Alarms and Events  
Security Level: 1  
Shortcut Keys: none  
Use the File»Print commands to print alarm and event reports. When you  
select one of these commands, a dialog box appears, prompting you to  
specify the time span to be printed. Use the Print Range option to specify  
any arbitrary time span. See the Alarms menu items for more details on  
filtering and printing alarms and events.  
© National Instruments Corporation  
3-3  
Lookout Operator’s Manual  
Download from Www.Somanuals.com. All Manuals Search And Download.  
       
Chapter 3  
Lookout Runtime Menu Commands  
File»Log on  
Security Level: 1  
Shortcut Keys: <CTRL+L>  
Use the  
command to log on to Lookout as the current  
File»Log on  
operator/integrator with your predefined account name and password.  
Only one person can log on at a time. You can also initiate this command  
by clicking on the account box in the status bar near the bottom left corner  
of the screen, where the account name appears.  
sets how long Lookout will run with no activity from an operator  
before automatically logging the current user off. Set  
to 0 to stay  
Idle time  
logged on indefinitely.  
Lookout Operator’s Manual  
3-4  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Chapter 3  
Lookout Runtime Menu Commands  
File»Log off  
File»Exit  
Security Level: 1  
Shortcut Keys: <CTRL+L>  
The File»Log off command instantly logs off the current account name and  
leaves (nobody) logged onto the system. You can also initiate this command  
by clicking on the account box near the bottom left corner of the screen,  
where the account name appears. When the Welcome to Lookout dialog  
box appears, click on the Log Off button.  
Security Level: 8  
Shortcut Keys: none  
The File»Exit command halts the executing process and exits Lookout.  
After you select File»Exit, Lookout gives you the opportunity to save the  
process files and asks you to verify that you want to stop the current  
processes.  
Caution The File»Exit command shuts down process execution—be very sure that this is  
what you want to do before selecting this command. Your Lookout application may be  
controlling critical processes, and shutting it down could cause serious problems.  
Edit Command  
Edit»Edit Mode  
Security Level: 9  
Shortcut Keys: <CTRL+SPACE>  
The Edit menu commands are only available when Lookout is in edit mode.  
You can use edit mode to create and/or modify a process file. Only people  
with a security level of 9 or membership in the Administrator group can  
enter edit mode. Edit mode is not available in run-time only packages.  
© National Instruments Corporation  
3-5  
Lookout Operator’s Manual  
Download from Www.Somanuals.com. All Manuals Search And Download.  
       
Chapter 3  
Lookout Runtime Menu Commands  
Option Commands  
Options»System  
Security Level: 9  
Shortcut Keys: none  
The Options»System command is used to configure various system-level  
operating parameters. See the Setting System Options section of  
Chapter 1, Installing Lookout, for further information on configuring  
Lookout.  
Options»User Manager  
Security Level: 10  
Shortcut Keys: none  
Use the Options»User Manger command to create, revise, and delete  
system user accounts. This option is only available to members of the  
Administrator security group.  
Lookout Operator’s Manual  
3-6  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter 3  
Lookout Runtime Menu Commands  
Options»Serial Ports  
Security Level: 9  
Shortcut Keys: none  
Use the Options»Serial Ports command to configure your computer serial  
port communication topology. Each serial port can have a unique setting:  
Hardwired, Dial-up, or Radio (RTS/CTS). Configure your serial port  
using the following instructions.  
Figure 3-1. Serial Port Settings Dialog Box  
1. In the Serial port data field, select the communication port you are  
defining (in this example, COM1).  
2. Define the serial port parameters for the appropriate communication  
port. Refer to the remaining sections in this chapter for complete  
descriptions of the parameters.  
3. Click on Accept to save the parameter changes for the serial port.  
4. Click on Quit to exit the dialog box.  
© National Instruments Corporation  
3-7  
Lookout Operator’s Manual  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Chapter 3  
Lookout Runtime Menu Commands  
Selecting the Serial Port  
The Serial port data field is a drop-down listbox. Use it to select the  
communication port you are defining. While software may allow many  
serial ports, most computers support only two serial ports without  
additional hardware.  
Setting Receive Gap  
The Receive gap setting is available for all serial connection types.  
This number specifies the number of empty bytes (or amount of time) a  
driver receives from a controller before the driver recognizes the end of a  
message frame and asks for another message. Normally, you should leave  
this at the default setting of 20. However, if you are experiencing garbled  
communication alarms, you might try increasing this number to allow more  
time before Lookout decides it has received a complete message. For  
example, with a slow baud rate of 1200, you might have to increase the  
Receive gap setting to approximately 30.  
Selecting the Serial Connection  
Hardwired Settings  
Hardwired serial connections require no hardware handshaking for line  
control. Use this setting for all serial communication types except dial-up  
telephone and remote radio transceivers. You should also use this setting  
when directly connecting Lookout to the Master Repeater on a radio system  
or through a leased-line modem. Because a Master Repeater is a full duplex  
device that does not require keying and unkeying of the frequency, it acts  
much like a physically hardwired network. Other hardwired connection  
types include RS-232, RS-422, RS-485, and leased telephone lines.  
Radio RTS/CTS Handshaking Settings  
RTS/CTS is a local hardware handshaking mechanism between the local  
computer and the local communication device. Use the Radio (RTS/CTS)  
serial connection when connecting the serial port to a device that requires  
RTS/CTS hardware handshaking, such as a radio transceiver that must be  
keyed up during data transmission and unkeyed during data reception.  
Other half-duplex communication media such as RS-485 may require  
RTS/CTS hardware handshaking. Although the RTS/CTS scheme works  
identically for other RTS/CTS communication schemes, assume that you  
are communicating via radio for this discussion.  
Lookout Operator’s Manual  
3-8  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter 3  
Lookout Runtime Menu Commands  
When you select RTS/CTS hardware handshaking, Lookout controls the  
RTS, or request-to-send pin, and monitors the CTS, or clear-to-send pin,  
during data transmission (pins 4 and 5 on a 25-pin RS-232 connector).  
Therefore, you must have at least the RTS pin (pin 4) wired straight  
through on your RS-232 cable. The CTS pin (pin 5) is optional.  
Lookout initiates a serial transmission on an RTS/CTS port by first  
asserting RTS to key the radio. Lookout then begins monitoring the state  
of the CTS pin. When the radio transmitter is fully keyed and ready to  
transmit, the radio asserts CTS and Lookout immediately begins data  
transmission. If the radio does not assert CTS within the CTS timeout  
setting (default is 100 ms), Lookout assumes the radio is ready to transmit  
and transmits anyway.  
The CTS timeout setting is the maximum amount of time that Lookout  
waits after asserting RTS for CTS before transmitting. Most radios  
typically take between 10 and 80 ms to key up. Consult your radio  
specifications and DIP switch settings to determine the key-up delay on  
your radio.  
If your radio can assert CTS when it is ready to transmit, add about 50 ms  
to the radio key-up delay specification and use this total value for the CTS  
timeout. If your radio does not assert CTS, you should begin by adding  
about 20 ms to your radio key-up time. Then increase this value in 10 ms  
increments until the remote radio begins to correctly receive the first bytes  
of the message.  
Some radios may assert CTS before they are actually ready to transmit. In  
this case, disconnect the CTS line (pin 5 on a 25-pin RS232 connector) and  
set the CTS timeout to a value high enough to let the radio fully key before  
transmission.  
After it transmits the last byte of data, Lookout continues to assert RTS,  
keeping the radio keyed until the RTS delay off time period expires. You  
should set this value to the default of 0 ms, so that Lookout unkeys the radio  
as soon as possible to prepare to receive the response.  
When unkeyed, most radios generate an audible squelch tail that the remote  
device might decode as unexpected garbage bytes. Some remote devices  
reject the entire message instead of just decoding the valid data and  
ignoring the extra garbage bytes. In this case, keep the radio keyed for  
several milliseconds using the RTS delay off setting. This time period  
delays the squelch tail long enough for the remote device to recognize the  
last data frame as valid before receiving garbage bytes caused by the  
squelch tail.  
© National Instruments Corporation  
3-9  
Lookout Operator’s Manual  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 3  
Lookout Runtime Menu Commands  
If you set the RTS delay off setting too high, the remote device begins  
transmitting its response before the local radio is unkeyed, causing a  
communication alarm in Lookout.  
Dial-Up Modem Settings  
Use the Dial-up serial connection when you use a modem in conjunction  
with a switched telephone line (not leased line). You can customize the  
dial-up settings for your particular modem and phone line.  
The default Dialing prefix settings are based on the Hayes Corporation  
AT command set, which is an industry standard for data modems. The  
following table explains the Lookout default settings. For additional  
commands, refer to your modem operation manual.  
Table 3-1. Dialing Prefix Default Settings  
Prefix  
AT  
Description  
Attention code that must precede all commands  
D
Dial phone number with these modifiers: Pfor pulse;  
Tfor tone  
E
M
V
X
Local echo mode: Efor no echo  
Speaker on or off: Mfor speaker always off  
Verbal or numeric result codes: Vfor numeric result codes  
Result code and dialing options: X4waits for dial tone  
before dialing, and recognizes busy signal  
When you use an external dial-up modem with Lookout, the DTR line in  
your cable between the modem and the computer must be wired straight  
through. This line is pin 20 on a 25-pin RS-232 connector and pin 4 on a  
9-pin connector. Lookout uses the DTR line to command the modem to  
disconnect (hang up) and return to the command mode.  
Some factory modems are not configured to respond to the DTR line. After  
Lookout first successfully dials out to a remote modem and finishes the  
polling cycle, it drops the DTR line, but the modem remains connected. If  
the modem does not respond after several seconds of Lookout attempting  
to raise and drop the DTR line, Lookout generates an alarm stating that the  
modem is not responding. If you receive this alarm message, your modem  
is not configured to monitor the DTR line.  
Lookout Operator’s Manual  
3-10  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Chapter 3  
Lookout Runtime Menu Commands  
The Hayes Corporation standard command for configuring the modem to  
hang up and enter command mode upon loss of DTR is &D2. You can use  
a terminal program to make this setting permanent on most modems by  
entering the modem command AT&D2&Wto store the setting permanently  
in nonvolatile modem memory. Or you can just add &D2into the Dialing  
prefix. The default Dialing prefix is ATX4MVEDT, so you might change it  
to AT&D2X4MVEDT.  
Retries specifies the number of times Lookout dials the specified phone  
number and attempts to connect to the modem at the other end of the line.  
If Lookout fails to connect after the specified Retries, it generates an alarm  
and moves on to the next phone number in the polling queue (if a queue  
has formed).  
Wait for connection specifies the length of time Lookout waits to receive  
a connect signal back from the modem it is calling. The time period begins  
when Lookout first sends the local modem the dialing prefix command. The  
time should be long enough for the local modem to receive a dial tone, dial  
the phone number, allow the remote modem to pick up the line, and send  
back a connect message. If the specified time is too short, your system  
could be operating correctly but never make a connection.  
Pause between calls is the length of time Lookout waits after hanging  
up before it sends the local modem the next dialing prefix signal. If the  
specified time is too brief, your system may not hang up the existing call  
but instead attempt to call the next number.  
Note Your specific modems, radios, and local phone lines may operate faster or slower  
than the default settings. You may need to use a trial-and-error approach to find the best  
settings for your system.  
Options»Import APT Database  
The Options»Import APT Database command only appears if a Tiway  
object exists in the currently executing process file. Choose this command  
to import an APT tag file and create new database members for the selected  
Tiway object.  
Options»Modbus  
When you create a Modbus object, Lookout adds the Options»Modbus  
item. Selecting this item displays Modbus statistics.  
© National Instruments Corporation  
3-11  
Lookout Operator’s Manual  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Chapter 3  
Lookout Runtime Menu Commands  
Alarm Commands  
Alarms»Show  
Security Level: 1  
Shortcut Keys: <CTRL+A>  
The Alarms»Show command instantly displays the alarm window as a  
floating style window if it is not already being displayed. You can select this  
command when you want to quickly and easily locate the alarm window  
from any location on any control panel. Notice the shortcut keystroke,  
<CTRL+A>. You can also call the alarm window by clicking on the alarm  
box in the far right end of the status bar at the bottom of the screen.  
Alarms»Display Options  
Security Level: 1  
Shortcut Keys: none  
The Alarms»Display Options command changes the display style of the  
alarm window (top, bottom, floating). You can also use this command to  
modify internal alarm display formats such as font, header, and various  
alarm information.  
The Window style determines the position of the alarms window in the  
Lookout workspace. If you select Floating, the alarms window appears as  
a pop-up style control panel that you can resize and move on the screen.  
You can minimize a floating alarms window at any time.  
If you use either the Top or Bottom window type, the Window height  
specifies the number of alarms Lookout can display in the alarms window.  
The actual height of the alarms window adjusts automatically depending on  
the selected font and Window height setting. You can resize a floating  
alarms window at any time with the sizing border. If more alarms occur  
Lookout Operator’s Manual  
3-12  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter 3  
Lookout Runtime Menu Commands  
than can be displayed in the alarms window at once, a scroll bar appears  
along the right side of the window.  
The following illustration shows an alarms window with Window style set  
to Bottom, and Window height set to 4.  
Alarms»Filter Options  
Security Level: 2  
Shortcut Keys: none  
Use the Alarms»Filter Options command to filter the alarms displayed in  
the alarm window by group, priority, and occurrence.  
The following dialog box appears.  
To monitor alarms with specific priorities, set the Min and Max values of  
the Priority criterion.  
Setting User Name restricts your alarm monitoring to alarms generated  
while that particular user is logged on. You can only select one user name  
at a time, but you can use wild card characters to widen the scope of the  
alarms reported.  
© National Instruments Corporation  
3-13  
Lookout Operator’s Manual  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Chapter 3  
Lookout Runtime Menu Commands  
Setting Ack User Name restricts your alarm monitoring to alarms  
acknowledged by that particular user. You can only enter one user name at  
a time, but you can use wild card characters to widen the scope of the  
alarms reported.  
The Ack Comment filter restricts your alarms displayed to those with the  
specified acknowledgement comment.  
Setting Object Name restricts your alarm monitoring to alarms involving  
the name you enter. You can only enter one name at a time, but you can use  
wild card characters to widen the scope of those objects reported.  
Setting Description restricts your monitoring alarms that meet your  
criteria. You can only choose one description category at a time, but you can  
use wild card characters to widen the scope of the alarms reported. The  
Lookout categories HiHi, Hi, Lo, or LoLo are added as a prefix to any  
descriptions, and are transparent to description filtering.  
Setting Area Name restricts your monitoring to the alarm area you choose.  
You can only enter one alarm area at a time. (Lookout 4 alarm areas are the  
same thing as Lookout 3.xx alarm groups.)  
Use the Browse Areas button to locate and select the alarm area you want  
to use as a filter.  
You can choose to have the Lookout alarm window show alarms only,  
events only, or both alarms and events by checking the appropriate box in  
the Show section of this dialog box.  
Use the parameters in the Old Alarms section to display alarms after they  
have been acknowledged.  
Selecting Audible Alarms enables a sound alert when an alarm takes  
place. The sound depends on your Windows system setting for error  
sounds.  
Alarms»Print  
Security Level: 1  
Shortcut Keys: none  
The Alarms»Print command invokes a dialog box you can use to specify  
the time period of the alarms you want to print.  
Lookout Operator’s Manual  
3-14  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Chapter 3  
Lookout Runtime Menu Commands  
The following dialog box appears.  
Select the time range you want to print alarms and events from with the  
items in the Print Range section of the dialog box. Notice that when  
defining your own range you use month and day followed by hour and  
minute.  
The Printouts selections determine the exact alarm information included  
in your printout. Snapshot only prints the status of alarms at the beginning  
of the specified Range but does not indicate what happened during the time  
span. Journal creates a printout of everything that happened during the  
time span from the beginning of the Range.  
Specific information about each alarm is presented in columnar format.  
Lookout prints only the information you designate. Select which columns  
you want printed in the Columns section of the dialog box.  
To print to a comma-separated file (.csv), select the Print to CSV file  
option. Enter the filenames for Snapshot and Journal files, including the  
path to where you want the files written. A relative path will be relative to  
the Lookout directory. If you enter the filename only, Lookout saves this  
file to your Lookout directory.  
© National Instruments Corporation  
3-15  
Lookout Operator’s Manual  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 3  
Lookout Runtime Menu Commands  
Set the format for printing times in the Time Format list.  
You can adjust your alarm filters for printing by clicking on the Filter  
Options button to access the alarm filter options  
Note You can print alarms as they happen by specifying a printer port in the Log alarms  
to field of the System Options dialog box, accessed by selecting Options»System from  
the menu bar. This works well for a printer directly connected to your computer. To print  
alarms directly to a network computer, you must capture a port in the network printer driver  
and link it to your networked printer. Consult your operating system documentation for  
detailed instructions on how to capture a port for a printer driver.  
Alarms»Select All  
Security Level: 2  
Shortcut Keys: none  
The Alarms»Select All command is a shortcut method for selecting all  
visible or non-filtered alarms for acknowledgment. Alarms that are not  
visible because of filtering or because the alarm window is minimized will  
not be selected. This is especially useful if your process is experiencing  
high numbers of alarms. Selecting each alarm individually can be very  
time consuming.  
Alarms»Deselect All  
Security Level: 2  
Shortcut Keys: none  
This command is a shortcut method for deselecting all alarms that are  
currently selected for acknowledgment. If you want to deselect only  
specific alarms, click on the individual alarm line.  
Alarms»Acknowledge  
Security Level: 2  
Shortcut Keys: none  
Operators select the Alarms»Acknowledge command to acknowledge  
alarms that are currently selected for acknowledgment.  
If you select one or more alarms for acknowledgment, a dialog box appears  
for you an operator to enter a comment concerning the alarm. Comments  
are optional, and you can click on OK to finish acknowledging alarms  
without entering a comment. You can search the database for alarms or  
Lookout Operator’s Manual  
3-16  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter 3  
Lookout Runtime Menu Commands  
print out the day’s alarms based on comments, so using certain standard  
comments (in addition to circumstantial comments) can make the filtering  
process easier.  
Alarms»Acknowledge All  
Security Level: 2  
Shortcut Keys: none  
Select the Alarms»Acknowledge All command to acknowledge all  
currently active alarms.  
Alarms»Properties  
Security Level: 2  
Shortcut Keys: none  
Select the Alarms»Properties to see detailed information about a selected  
alarm. This option is also available when you right-click on an alarm in the  
alarm window.  
© National Instruments Corporation  
3-17  
Lookout Operator’s Manual  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
Chapter 3  
Lookout Runtime Menu Commands  
Right-click on an alarm and select Properties. The following dialog box  
listing specific information about the alarm or event appears.  
You can scroll through alarms and events using the Previous and Next  
buttons of this dialog.  
Window Commands  
Window»Arrange Icons  
Window»Arrange Icons arranges the control panel icons across the  
bottom of the Lookout workspace in neat columns and rows. Lookout  
spaces them according to the setting for icon spacing in the Microsoft  
Windows Control Panel.  
Window»Minimize All  
Window»Minimize All minimizes all control panels and displays their  
icons across the bottom of the Lookout workspace.  
Window»nTitle  
The titles of all control panels appear at the bottom of the Window menu,  
each with a number you can use when selecting panels with the keyboard  
instead of the mouse. You can locate a particular panel by finding its title in  
this list and selecting it. Lookout then displays the panel in the workspace.  
Of course, if the panel is outside of the visible workspace, you may have to  
scroll around in the workspace to make the panel visible.  
Lookout Operator’s Manual  
3-18  
Download from Www.Somanuals.com. All Manuals Search And Download.  
       
Chapter 3  
Lookout Runtime Menu Commands  
Window»More Windows  
If you have too many control panels to fit in the Window menu, the More  
Windows command appears at the bottom of the Window menu. The  
Window»More Windows command pops up a dialog box you can use to  
scroll through the control panel titles and select the window to display by  
double-clicking on the panel title.  
Run Commands  
Run»Add  
Security Level: 9  
Shortcut Keys: none  
The Run»Add command adds up to ten DOS-style commands to the run  
submenu list. Operators subsequently invoke these commands with a click  
of the mouse—without leaving Lookout. For instance, you might want to  
print a custom report on demand. The following example loads Excel and  
runs the macro daily.xlm, which pulls historical data off the hard drive,  
places it into a preconfigured report template, and sends it to the printer.  
Consult your Excel documentation for more information on writing your  
macros.  
The Security level setting applies to any command you add or revise. This  
means you can configure multiple commands, some of which may only be  
invoked by high level operators. The following illustration shows the Run  
menu with the Daily Report item added.  
© National Instruments Corporation  
3-19  
Lookout Operator’s Manual  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Chapter 3  
Lookout Runtime Menu Commands  
Run»Revise  
Security Level: 9  
Shortcut Keys: none  
Use the Run»Revise command to modify previously configured run  
commands.  
Run»Delete  
Security Level: 9  
Shortcut Keys: none  
Use the Run»Delete to remove previously configured run commands.  
Help Commands  
Help»Contents  
Select Help»Contents to access the Lookout help system. Many of the  
topics in the help system apply to development of Lookout processes, but  
you can also find information that may be helpful for operational problems.  
Help»About Lookout  
Select Help»About Lookout to access information on the copy of Lookout  
you are running, the version of Windows you are running in, and the  
processes currently running on your version of Lookout.  
Lookout Operator’s Manual  
3-20  
Download from Www.Somanuals.com. All Manuals Search And Download.  
         
A
Technical Support Resources  
This appendix describes the comprehensive resources available to you in  
the Technical Support section of the National Instruments Web site and  
provides technical support telephone numbers for you to use if you have  
trouble connecting to our Web site or if you do not have internet access.  
NI Web Support  
To provide you with immediate answers and solutions 24 hours a day,  
365 days a year, National Instruments maintains extensive online technical  
support resources. They are available to you at no cost, are updated daily,  
and can be found in the Technical Support section of our Web site at  
Online Problem-Solving and Diagnostic Resources  
KnowledgeBase—A searchable database containing thousands of  
frequently asked questions (FAQs) and their corresponding answers or  
solutions, including special sections devoted to our newest products.  
The database is updated daily in response to new customer experiences  
and feedback.  
Troubleshooting Wizards—Step-by-step guides lead you through  
common problems and answer questions about our entire product line.  
Wizards include screen shots that illustrate the steps being described  
and provide detailed information ranging from simple getting started  
instructions to advanced topics.  
Product Manuals—A comprehensive, searchable library of the latest  
editions of National Instruments hardware and software product  
manuals.  
Hardware Reference Database—A searchable database containing  
brief hardware descriptions, mechanical drawings, and helpful images  
of jumper settings and connector pinouts.  
Application Notes—A library with more than 100 short papers  
addressing specific topics such as creating and calling DLLs,  
developing your own instrument driver software, and porting  
applications between platforms and operating systems.  
© National Instruments Corporation  
A-1  
Lookout Operator’s Manual  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
Appendix A  
Technical Support Resources  
Software-Related Resources  
Instrument Driver Network—A library with hundreds of instrument  
drivers for control of standalone instruments via GPIB, VXI, or serial  
interfaces. You also can submit a request for a particular instrument  
driver if it does not already appear in the library.  
Example Programs Database—A database with numerous,  
non-shipping example programs for National Instruments  
programming environments. You can use them to complement the  
example programs that are already included with National Instruments  
products.  
Software Library—A library with updates and patches to application  
software, links to the latest versions of driver software for National  
Instruments hardware products, and utility routines.  
Worldwide Support  
National Instruments has offices located around the globe. Many branch  
offices maintain a Web site to provide information on local services. You  
can access these Web sites from www.natinst.com/worldwide.  
If you have trouble connecting to our Web site, please contact your local  
National Instruments office or the source from which you purchased your  
National Instruments product(s) to obtain support.  
For telephone support in the United States, dial 512 795 8248. For  
telephone support outside the United States, contact your local branch  
office:  
Australia 03 9879 5166, Austria 0662 45 79 90 0, Belgium 02 757 00 20,  
Brazil 011 284 5011, Canada (Calgary) 403 274 9391,  
Canada (Ontario) 905 785 0085, Canada (Québec) 514 694 8521,  
China 0755 3904939, Denmark 45 76 26 00, Finland 09 725 725 11,  
France 01 48 14 24 24, Germany 089 741 31 30, Greece 30 1 42 96 427  
Hong Kong 2645 3186, India 91805275406, Israel 03 6120092,  
Italy 02 413091, Japan 03 5472 2970, Korea 02 596 7456,  
Mexico (D.F.) 5 280 7625, Mexico (Monterrey) 8 357 7695,  
Netherlands 0348 433466, Norway 32 27 73 00, Singapore 2265886,  
Spain (Barcelona) 93 582 0251, Spain (Madrid) 91 640 0085,  
Sweden 08 587 895 00, Switzerland 056 200 51 51,  
Taiwan 02 2377 1200, United Kingdom 01635 523545  
Lookout Operator’s Manual  
A-2  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Glossary  
Prefix  
m-  
Meaning  
milli-  
Value  
103  
103  
k-  
kilo-  
M-  
mega-  
106  
A
alarm  
Software notification of a condition in a process. This alarm may call  
attention of a value that has exceeded or fallen below certain levels, set in  
the object database or in an Alarm object.  
C
Citadel  
The Lookout historical database that stores your data for access later.  
client  
A Lookout process that monitors a Lookout server process. Lookout clients  
should be computer independent so that they can be run from any computer  
on your network. Lookout server processes run on computers actually  
connected to your control hardware.  
comm port  
Term sometimes used for a serial port.  
connection  
Input to a Lookout object’s writable data members.  
control objects  
Lookout objects you use to control a process, change a data value, adjust a  
register, and so on.  
controllable objects  
CTS  
Lookout objects you can control with a Lookout control object.  
Clear to Send. Part of a handshaking protocol for certain devices that  
connect the serial port of a computer.  
© National Instruments Corporation  
G-1  
Lookout Operator’s Manual  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Glossary  
D
data member  
Data source or sink associated with a Lookout object. A readable data  
member, or source, may be used in expressions or as inputs to other  
objects. A writable data member, or sink, may have at most one  
connection into it, created using the Object»Edit Connections dialog  
box. A data member may be both readable and writable.  
database  
Collection of data stored for later retrieval, display, or analysis.  
Part of the Hayes AT command set for use with modems.  
dialing prefix  
displayable objects  
A Lookout object class that has a displayable component, such as a Pot,  
a Switch, or a Pushbutton.  
E
edit mode  
Lookout mode in which you can alter and create objects within a process.  
Switch in and out of edit mode by pressing <Ctrl-space> or by selecting  
Edit»Edit Mode.  
Ethernet  
event  
A widely used, standardized local area networking technology, specified in  
the IEEE 802.3 standard.  
Anything that happens can be an event. In Lookout, events include such  
things as adjusting a control value, entering or exiting edit mode, opening  
or closing a control panel, and logging in or logging out of the system.  
expressions  
Lookout expressions are often paths to a data member. They can also  
function like variables that, using a spreadsheet cell type formula, become  
capable of performing flexible, real-time math operations, condition  
testing, and other complex operations functions.  
Lookout Operator’s Manual  
G-2  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Glossary  
F
frame  
Sequence of bytes sent from a computer to a device or vice versa. The  
syntax of the frame depends on the protocol being used. A read frame  
contains enough information to specify a set of variables whose values  
the device should return. A write frame specifies a variable in the device  
and a new value to write into that variable. Some protocols support the  
writing of multiple variables in a single frame. A response frame is  
returned from the device to the computer, indicating whether the frame  
just sent to it was received successfully. If the frame just received was  
a read frame, the response frame contains a set of requested values.  
H
hi and hihi  
Alarm settings. Both warn that a value has gone above some setpoint.  
Generally a Hi alarm is used to alert an operator of a need for intervention.  
A hihi alarm is usually used to alert an operator that the value has been  
exceeded by an even greater margin than a hi alarm indicates, and is usually  
used to indicate an urgent need for action.  
historical logging  
HOA  
The process of storing data in a database for use at another time, or from  
another location.  
Hand-Off-Auto control, used to set whether a value must be changed  
manually, is completely turned off, or functions automatically. You can use  
a Pot object and a complex expression to create this sort of control in  
Lookout, or you can use a RadioButton object, depending on the particular  
requirements of the task you need to accomplish.  
I
I/O point  
Every read-only, write-only, or read-write connection Lookout makes to  
external hardware is counted as an I/O point. Lookout is licensed for use  
with a set number of I/O points. If you exceed the number you are licensed  
to use with your copy of Lookout, a warning message appears on your  
computer screen warning you to shut down one of your processes within a  
specified time before Lookout cuts back on I/O usage.  
© National Instruments Corporation  
G-3  
Lookout Operator’s Manual  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Glossary  
L
.l4pfiles  
File extension for Lookout process files. These are the compiled files  
Lookout runs when it runs a process.  
.l4tfiles  
File extension for a Lookout state file, which stores the values for Lookout  
controls and other objects with state information.  
.lkafiles  
File extension for Lookout security files.  
.lkpfiles  
File extension for Lookout process files in versions of Lookout earlier than  
Lookout 4.  
.lksfiles  
File extension for a Lookout source file, which Lookout compiles to make  
a Lookout process file that Lookout can run. This is the file you should  
make sure you keep backed up in case you need to recreate a corrupted  
process file, or in case some future version of Lookout cannot run a process  
file compiled in an earlier version of Lookout.  
O
ODBC  
Open DataBase Connectivity, a standard application programming  
interface (API) for accessing a database. You can use ODBC statements to  
access files in a number of different databases, including Access, dBase,  
DB2, and Excel.  
ODBC is compatible with the Structured Query Language (SQL)  
Call-Level Interface. ODBC handles SQL requests by converting them into  
requests an ODBC database can use.  
P
process  
In Lookout, process refers to a Lookout “program”, used for industrial  
automation, control, monitoring, or reporting.  
process file  
The Lookout binary file Lookout executes when running a process. Carries  
the .l4pextension.  
Lookout Operator’s Manual  
G-4  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Glossary  
R
receive gap  
A serial communications setting that determines the number of empty bytes  
(or amount of time) a driver receives before recognizing the end of a  
message frame and requesting another message.  
RTS  
Request to Send, part of a handshaking protocol for certain devices that  
connect the serial port of a computer.  
S
security accounts  
Also called user and group accounts, Lookout uses security accounts to  
define what users or group of users have different operation privileges in  
Lookout.  
server  
A process that provides data (services) to client processes. In Lookout,  
server processes are intended to be run on one computer only, with direct  
connections to field hardware. Client processes interact with field hardware  
through server processes.  
source file  
state file  
Lookout file that can be compiled to produce a binary Lookout process file  
that runs a process. Uses a .lksfile extension.  
The Lookout file that stores the value of all Lookout control parameters and  
object data members in use in a process. Uses the file extension .l4t.  
system objects  
Lookout objects used to control other objects or process and analyze data.  
T
TCP  
Transmission Control Protocol, a method (protocol) for sending data  
between computers. Used with IP, the Internet Protocol.  
TCP/IP  
TCP/IP sends data as packets, with IP handling the delivery of data and  
TCP keeping track of the individual packets.  
© National Instruments Corporation  
G-5  
Lookout Operator’s Manual  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Index  
A
D
About Lookout command, 3-20  
Acknowledge command, Alarm  
menu, 3-16 to 3-17  
Delete command, Run menu, 3-20  
Deselect All command, Alarm menu, 3-16  
diagnostic resources, online, A-1  
dial-up modem settings, 3-10 to 3-11  
Display Options command, Alarm  
menu, 3-12 to 3-13  
Acknowledge All command, Alarm menu, 3-17  
Add command, Run menu, 3-19  
adding client connections, 1-5 to 1-6  
Alarm commands, 3-12 to 3-18  
Acknowledge, 3-16 to 3-17  
Acknowledge All, 3-17  
Deselect All, 3-16  
E
Edit Mode command, 3-5  
Exit command, 3-5  
Display Options, 3-12 to 3-13  
Filter Options, 3-13 to 3-14  
Print, 3-14 to 3-16  
Properties, 3-17 to 3-18  
Select All, 3-16  
F
File commands, 3-1 to 3-5  
Close, 3-2 to 3-3  
Close All, 3-3  
Show, 3-12  
alarm window, 2-7  
application files, 2-8 to 2-9  
process file, 2-8  
Exit, 3-5  
Log off, 3-5  
Log on, 3-4  
New, 3-1  
Open, 3-1 to 3-2  
Print, 3-3 to 3-4  
Reopen, 3-2  
source code file, 2-8 to 2-9  
state file, 2-9  
Arrange Icons command, 3-18  
C
Save, 3-3  
Save All, 3-3  
Filter Options command, Alarm  
menu, 3-13 to 3-14  
Citadel Database settings, 1-8  
client connections, adding, 1-5 to 1-6  
Close command, 3-2 to 3-3  
Close All command, 3-3  
computer name setting, 1-7  
Contents command, Help menu, 3-20  
control panels  
H
handshaking settings, radio RTS/CTS,  
3-8 to 3-10  
copies of controls, 2-6  
hardware key for Lookout (note), 1-3  
hardware requirements, 1-1  
hardwired serial connections, 3-8  
purpose and use, 2-5 to 2-7  
types of control panels, 2-5 to 2-6  
conventions used in manual, iv  
© National Instruments Corporation  
I-1  
Lookout Operator’s Manual  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Index  
Help commands  
starting Lookout for first time,  
1-3 to 1-5  
setting system options, 1-7 to 1-8  
starting, 2-1 to 2-3  
About Lookout, 3-20  
Contents, 3-20  
startup process file setting, 1-9 to 1-10  
TCP/IP networking, 1-2  
Windows services, 2-10  
Lookout Citadel Server, 2-10  
Lookout Classified Ads, 2-10  
Lookout screen, 2-3 to 2-7  
alarm window, 2-7  
I
Import APT Database command, 3-11  
installing Lookout, 1-2  
I/O points  
changing number of, 1-5  
for unregistered Lookout package, 1-3  
control panels, 2-5 to 2-7  
menu bar, 2-5  
process in place in run mode (figure), 2-4  
status bar, 2-5  
K
keycode  
adding client connections, 1-5  
registering Looking, 1-4  
title bar, 2-4  
workspace, 2-5  
Lookout Time Synchronization, 2-10  
L
log alarms settings, 1-8  
Log off command, 3-5  
M
menu bar, 2-5  
Log on command, 3-4  
Minimize All command, Window menu, 3-18  
Modbus command, 3-11  
More Windows command, 3-19  
logging on to Lookout, 2-1 to 2-2  
Lookout. See also Runtime menu commands.  
application files, 2-8 to 2-9  
process file, 2-8  
N
source code file, 2-8 to 2-9  
state file, 2-9  
hardware and software requirements, 1-1  
installing, 1-2  
National Instruments Web support, A-1 to A-2  
New command, 3-1  
operator input and navigation, 2-7 to 2-8  
virtual keyboard, 2-8  
O
online problem-solving and diagnostic  
resources, A-1  
virtual keypad, 2-7  
registering, 1-3 to 1-6  
Open command, 3-1 to 3-2  
operator input and navigation, 2-7 to 2-8  
virtual keyboard, 2-8  
adding client connections, 1-5 to 1-6  
changing registration  
information, 1-5  
virtual keypad, 2-7  
limitations of unregistered  
package, 1-3  
Lookout Operator’s Manual  
I-2  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Index  
Option commands, 3-6 to 3-11. See also  
system options, setting.  
Import APT Database, 3-11  
Modbus, 3-11  
File commands, 3-1 to 3-5  
Help commands, 3-20  
Option commands, 3-6 to 3-11  
Run commands, 3-19 to 3-20  
Window commands, 3-18 to 3-19  
Serial Ports, 3-7 to 3-11  
System, 3-6  
User Manager, 3-6  
S
Save command, 3-3  
Save All command, 3-3  
P
panel navigation arrows, 1-8  
Print command  
security level settings, 1-8  
Select All command, Alarm menu, 3-16  
serial number for Lookout, 1-4  
Serial Ports command, 3-7 to 3-11  
receive gap setting, 3-8  
Alarm menu, 3-14 to 3-16  
File menu, 3-3 to 3-4  
problem-solving and diagnostic resources,  
online, A-1  
serial connection selection, 3-8 to 3-11  
dial-up modem settings, 3-10 to 3-11  
hardwired settings, 3-8  
process file  
definition, 2-8  
opening, 2-3  
Properties command, Alarm  
menu, 3-17 to 3-18  
radio RTS/CTS handshaking  
settings, 3-8 to 3-10  
serial port selection, 3-8  
Serial Port Settings dialog box  
(figure), 3-7  
R
Show command, Alarm menu, 3-12  
software requirements, 1-1  
software-related resources, A-2  
source code file, 2-8 to 2-9  
starting Lookout  
for first time, 1-3 to 1-5  
logging on, 2-1 to 2-2  
opening process file, 2-3  
startup process file setting, 1-9 to 1-10  
state file, 2-9  
radio RTS/CTS handshaking  
settings, 3-8 to 3-10  
receive gap, setting, 3-8  
registering Lookout, 1-3 to 1-6  
adding client connections, 1-5 to 1-6  
changing registration information, 1-5  
limitations of unregistered package, 1-3  
starting Lookout for first time, 1-3 to 1-5  
Reopen command, 3-2  
Revise command, Run menu, 3-20  
Run commands, 3-19 to 3-20  
Add, 3-19  
status bar, 2-5  
System command, 3-6  
system options, setting, 1-7 to 1-8  
System Options Dialog Box (figure), 1-7  
Delete, 3-20  
Revise, 3-20  
Runtime menu commands, 3-1 to 3-20  
Alarm commands, 3-12 to 3-18  
Edit command, 3-5  
© National Instruments Corporation  
I-3  
Lookout Operator’s Manual  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Index  
T
W
TCP/IP networking, 1-2  
Web support from National Instruments,  
A-1 to A-2  
technical support resources, A-1 to A-2  
title bar, 2-4  
nTitle command, Window menu, 3-18  
online problem-solving and diagnostic  
resources, A-1  
software-related resources, A-2  
Window commands, 3-18 to 3-19  
Arrange Icons, 3-18  
U
User Manager command, 3-6  
Minimize All, 3-18  
More Windows, 3-19  
nTitle, 3-18  
V
Windows services, 2-10  
workspace for Lookout, 2-5  
Worldwide technical support, A-2  
virtual keyboard  
operating, 2-8  
settings, 1-8  
virtual keypad, 2-7  
Lookout Operator’s Manual  
I-4  
Download from Www.Somanuals.com. All Manuals Search And Download.  

Nady Systems Microphone UIC80PP User Manual
NeumannBerlin Microphone KM 53c User Manual
Nokia Bluetooth Headset BH 213 User Manual
Nortel Networks IP Phone MCC 3100 User Manual
OEM Systems Speaker RB 12 User Manual
Olympus Microcassette Recorder DP 201 User Manual
Oracle Audio Technologies Stereo Amplifier DAC 1000 User Manual
Oreck Vacuum Cleaner XL3605HH User Manual
Oregon Scientific Watch SL110 User Manual
Orion Car Audio Automobile Battery Charger MBR70 User Manual