Toshiba NB 100 Laptop User Manual


 
4-6 User’s Manual
NB 100 Series
Using the microphone
You can use the built-in or an external microphone that connects to the
microphone jack to record monaural sounds into your applications. It can
also be used to issue voice commands to applications that support such
functions.(Built-in microphone is provided with some models)
Since your computer has a microphone and speaker, “feedback” may be
heard under certain conditions. Feedback occurs when sound from the
speaker is picked up in the microphone and amplified back to the speaker,
which amplifies it again to the microphone.
This feedback occurs repeatedly and causes a very loud, high-pitched
noise. It is a common phenomenon that occurs in any sound system when
the microphone input is output to the speaker (throughput) and the speaker
volume is too loud or too close to the microphone. You can control
throughput by adjusting the volume of your speaker or through the Mute
function in the Master Volume panel. Refer to your Windows documentation
for details on using the Master Volume panel.
Wireless communications
The computer’s wireless communication function supports both Wireless
LAN and Bluetooth devices.
Wireless LAN
The Wireless LAN is compatible with other LAN systems based on Direct
Sequence Spread Spectrum/Orthogonal Frequency Division Multiplexing
radio technology that complies with IEEE 802.11 wireless LAN standard
(Revision B and G).
Supported features. It supports the following features:
Automatic Transmit Rate Select mechanism in the transmit range of 54,
48, 36, 24, 18, 9 and 6 Mbit/s (Revision G).
Automatic Transmit Rate Select mechanism in the transmit range of 11,
5.5, 2 and 1 Mbit/s (Revision B).
Frequency Channel Selection (Revision B/G: 2.4GHz)
Roaming over multiple channels
Card Power Management
Wired Equivalent Privacy (WEP) data encryption, based on the 128 bit
encryption algorithm (Atheros module type).
Security
Be sure to enable encryption function. Otherwise your computer will
allow the illegal access by outsider through wireless LAN to cause
illegal instruction, eavesdropping, and loss or destruction of stored data.
TOSHIBA strongly recommends the customer to enable the encryption
function.