Useful Functions
This chapter explains useful functions for giving presentations and so on, and the security functions.
Changing the Projected Image ..........................15
• Automatically Detect Incoming Signals and
Change the Projected Image (Source Search)................15
• Changing Directly from the Remote Control .................16
Functions for Enhancing Projection ................. 17
• Selecting the Projection Quality
(Selecting Color Mode) .....................................................17
• Setting the Auto Iris..........................................................18
• Hiding the Image and Sound Temporarily
(A/V Mute) .........................................................................18
• Freezing the Image (Freeze).............................................19
• Changing the Aspect Ratio...............................................20
Changing methods..........................................................................20
Changing the aspect for video equipment images..........................20
Changing the aspect for computer images (For EB-1725/1720)...21
Changing the aspect for computer images images
(For EB-1735W/1730W)...........................................................22
• Pointer Function (Pointer) ...............................................24
• Enlarging Part of the Image (E-Zoom) ...........................25
• Using the Remote Control to Operate the Mouse
Pointer (Wireless Mouse) .................................................27
Restrictions in the Target Projector when
Using Multiple Projectors...................................29
• Setting the Projector ID ................................................... 30
• Setting the Projector ID on the Remote Control ........... 30
Correcting Color for Multiple Projectors
(Multi-Screen Color Adjustment).......................31
• Summary of Correction Procedure ................................ 31
• Correction Method ........................................................... 31
Security Functions..............................................33
• Managing Users (Password Protect)............................... 33
Type of Password Protect .............................................................. 33
Setting Password Protect................................................................ 33
Entering the Password.................................................................... 35
• Restricting Operation (Control Panel Lock) ................. 35