NAPCO PIR1680PT Intruder detector
Technical Specification
- Make: NAPCO
- Model code: PIR1680PT
- PIR Detectors: Yes
- Coverage/ Range m: 13.7 x 13.7
- Angle of Detection o: 85
The PIR1680PT is an ideal fit for both commercial and residential applications, large or small. With up to 65 lb Pet/Animal Immunity, and RFI shielded-electronics the PIR1680PT adds ultra-dependable detection capability to any security system. Detect and Compare Imaging Diagnostics Technology for advanced false and true alarm detection. Sensor chamber prevents insect, draft and dust interference.
Read moreMake | NAPCO |
---|---|
Manufacturer | NAPCO Security Systems Inc |
Category | Intruder Alarms>Intruder detectors |
Model code | PIR1680PT |
PIR Detectors | Yes |
Coverage/ Range m | 13.7 x 13.7 |
Angle of Detection o | 85 |
Pet Tolerance | Yes |
Power Consumption | 28 |
Temperature Compensation | Yes |
Sealed Optics | Yes |
Creep Zone | Look-Down/Creep Zone |
Wall/Ceiling Mount | Wall or Corner |
Electrical Specifications | Power Supply: 10.6 ~ 16 |
Physical Specifications | Dimensions mm: 840 x 640 x 480 |
Environmental Specifications | Operating Temp oC: -10 ~ +50 |
Additional info | The PIR1680PT is an ideal fit for both commercial and residential applications, large or small. With up to 65 lb Pet/Animal Immunity, and RFI shielded-electronics the PIR1680PT adds ultra-dependable detection capability to any security system. Detect and Compare Imaging Diagnostics Technology for advanced false and true alarm detection. Sensor chamber prevents insect, draft and dust interference. |
Download PDF version Download PDF version |
You might be interested in these products
- See other NAPCO products
- NAPCO Intruder alarm system control panels & accessories
- NAPCO Intruder alarm communicators
Related Whitepapers
Market Report: Cannabis at a glance
Optimise your business with analytics and AI
The ultimate guide to mastering key control
DownloadUsing artificial intelligence (AI) to automate physical security systems
DownloadA modern guide to data loss prevention
Download7 proven solutions for law enforcement key control and asset management
DownloadThe truth behind 9 mobile access myths
Download