User’s Manual 4-25
A300
Using the microphone
You can use the built-in or an external microphone that connects to the
microphone jack to record monaural sounds into your applications. It can
also be used to issue voice commands to applications that support such
functions. (Built-in microphone is provided with some models)
Since your computer has a microphone and speaker, “feedback” may be
heard under certain conditions. Feedback occurs when sound from the
speaker is picked up in the microphone and amplified back to the speaker,
which amplifies it again to the microphone.
This feedback occurs repeatedly and causes a very loud, high-pitched
noise. It is a common phenomenon that occurs in any sound system when
the microphone input is output to the speaker (throughput) and the speaker
volume is too loud or too close to the microphone. You can control
throughput by adjusting the volume of your speaker or through the Mute
function in the Master Volume panel. Refer to your Windows documentation
for details on using the Master Volume panel.
Using TOSHIBA Face Recognition
If your computer is equipped with a web camera, the TOSHIBA Face
Recognition feature can be used to verify the face of users when they log
on to Windows. If the verification is successful, a user will be logged on to
Windows automatically. The user can thus avoid having to enter a
password, which makes the login process easier.
Notes
Please note the following hints when using TOSHIBA Face Recognition:
■ Changes of the likeness of a registrant such as hair style changes,
wearing of a cap or wearing glasses may prevent a registrant from
being recognized correctly. In this case, log on to Windows using your
password.
■ Bright background light and/or shadows may prevent a registrant from
being recognized correctly. In this case, log on to Windows using your
password.
■ Faces similar to a registrant’s may be recognized accidently.
Do not use TOSHIBA Face Recognition for high-security purposes. It is not
a suitable substitute for Windows password security. Use your established
Windows passwords for security-sensitive log on.