User's Manual

Table Of Contents
10
Seeker & Seeker MCA III Operation Manual
How this Manual is Organized
This manual is divided into the following chapters:
• Chapter 1, “General Information” provides Trilithic contact information and describes
how this operation manual is structured.
• Chapter 2, “Seeker Introduction” introduces what the Seeker is and what it does. This
chapter discusses the practical application, connections and controls of the Seeker.
Finally,thischapterdiscussestheSeekersbatteryandhowtoupdateyourrmware.
• Chapter3,“SeekerOperation”describeshowtocongureandoperatetheSeeker.
• Chapter 4, “Leakage Testing” describes the steps needed to perform leakage testing
using the Seeker.
• Chapter 5, “Seeker MCA III Introduction” introduces what the Seeker MCA III is and
what it does. This chapter discusses the practical application of the Seeker MCA III.
Finally, this chapter will also explain the connections of the Seeker MCA III.
• Chapter 6, “Seeker MCA III Operation” describes how to use the modes of operation of
the Seeker MCA III.
• Chapter 7, “Data Upload Options” shows the data upload options for the Seeker MCA
III.
• Chapter8,“Appendix”showsthetechnicalspecicationsoftheSeekerandSeeker
MCA III as well as any error codes that may appear on the Seeker’s display screen.