80
L i f e B o o k P S e r i e s N o t e b o o k - S e c t i o n E i g h t
MIDI
Musical Instrument Digital Interface. A standard
communication protocol for exchange of information
between computers and sound producers such as
synthesizers.
Modem
A contraction for MOdulator-DEModulator. The
equipment which connects a computer or other data
terminal to a communication line.
Monaural
A system using one channel to process sound from all
sources.
MPU-401
A standard for MIDI interfaces and connectors.
MTU
Maximum Transmission Unit
The maximum data size that can be transferred at a time
through the Internet or other networks. You can set a
smaller MTU size to obtain successful communication,
if you have difficulty transferring data due to the fact
that the maximum size is too large.
Network authentication
The method of authentication performed by wireless
LAN clients to connect with the access point. There are
two types: open system authentication and shared key
authentication. The type of authentication must be set
to each client and also coincide with the setting of access
point with which to communicate. Network authentica-
tion is sometimes called authentication mode.
Network key
Data that is used for encrypting data in data communi-
cation. The personal computer uses the same network
key both for data encryption and decryption, therefore,
it is necessary to set the same network key as the other
side of communication.
Network name (SSID: Security Set Identifier)
When a wireless LAN network is configured, grouping is
performed to avoid interference or data theft. This
grouping is performed with “Network name (SSID)”. In
order to improve security, the network key is set
allowing no communication unless “Network name
(SSID)” coincides with the network key.
NTSC
National TV Standards Commission. The standard for
TV broadcast and reception for the USA.
Open system authentication
One of network authentication types for wireless LAN.
Since there is no check of network key upon authentica-
tion, clients can connect to the access point without
submitting correct network keys. However, in case of
actual communications, the same network key must be
set. Open system authentication is sometimes called
Open key authentication.
Operating System
A group of control programs that convert application
commands, including driver programs, into the exact
form required by a specific brand and model of micro-
processor in order to produce the desired results from
that particular equipment.
Partition
A block of space on a hard drive which is set aside and
made to appear to the operating system as if it were a
separate disk, and addressed by the operating system
accordingly.
PCMCIA
PCMCIA is a trademark of the Personal Computer
Memory Card International Association. The Personal
Computer Memory Card International Association is an
organization that sets standards for add-in cards for
personal computers.
Peripheral Device
A piece of equipment which performs a specific function
associated with but not integral to a computer.
Examples: a printer, a modem, a CD-ROM.
Pitch (keyboard)
The distance between the centers of the letter keys of a
keyboard.
Pixel
The smallest element of a display, a dot of color on your
display screen. The more pixels per area the clearer your
image will appear.
POST
Power On Self Test. A program which is part of the BIOS
which checks the configuration and operating condition
of your hardware whenever power is applied to your
notebook. Status and error messages may be displayed
before the operating system is loaded. If the self test
detects failures that are so serious that operation can not
continue, the operating system will not be loaded.
PPPoE
Point to Point Protocol over Ethernet.
A protocol for Ethernet, using a Point-to-Point Protocol
(PPP), which is used for connection on the phone line.
Program
An integrated set of coded commands to your
computers telling your hardware what to do and how
and when to do it.
P Series.book Page 80 Wednesday, July 6, 2005 2:29 PM
Summary of Contents for LIFEBOOK P Series
Page 6: ...L i f e B o o k P S e r i e s ...
Page 7: ...1 1 Preface ...
Page 8: ...2 L i f e B o o k P S e r i e s N o t e b o o k ...
Page 10: ...4 L i f e B o o k P S e r i e s N o t e b o o k ...
Page 11: ...5 2 Getting to Know Your LifeBook ...
Page 12: ...6 L i f e B o o k P S e r i e s N o t e b o o k S e c t i o n T w o ...
Page 32: ...26 L i f e B o o k P S e r i e s N o t e b o o k S e c t i o n T w o ...
Page 33: ...27 3 Using Your LifeBook ...
Page 34: ...28 L i f e B o o k P S e r i e s N o t e b o o k S e c t i o n T h r e e ...
Page 41: ...35 4 User Installable Features ...
Page 42: ...36 L i f e B o o k P S e r i e s N o t e b o o k S e c t i o n F o u r ...
Page 54: ...48 L i f e B o o k P S e r i e s N o t e b o o k S e c t i o n F o u r ...
Page 55: ...49 5 Troubleshooting ...
Page 56: ...50 L i f e B o o k P S e r i e s N o t e b o o k S e c t i o n F i v e ...
Page 68: ...62 L i f e B o o k P S e r i e s N o t e b o o k S e c t i o n F i v e ...
Page 69: ...63 6 Care and Maintenance ...
Page 70: ...64 L i f e B o o k P S e r i e s N o t e b o o k S e c t i o n S i x ...
Page 74: ...68 L i f e B o o k P S e r i e s N o t e b o o k S e c t i o n S i x ...
Page 75: ...69 7 Specifications ...
Page 76: ...70 L i f e B o o k P S e r i e s N o t e b o o k S e c t i o n S e v e n ...
Page 81: ...75 8 Glossary ...
Page 82: ...76 L i f e B o o k P S e r i e s N o t e b o o k S e c t i o n E i g h t ...
Page 89: ...83 Appendix A Integrated Wireless LAN User s Guide Optional Device ...
Page 90: ...84 L i f e B o o k P S e r i e s N o t e b o o k A p p e n d i x A ...
Page 104: ...98 L i f e B o o k P S e r i e s N o t e b o o k A p p e n d i x A ...
Page 105: ...99 Appendix B Using the Fingerprint Swipe Sensor ...
Page 106: ...100 L i f e B o o k T S e r i e s T a b l e t P C A p p e n d i x B ...
Page 114: ...108 L i f e B o o k T S e r i e s T a b l e t P C A p p e n d i x B ...
Page 118: ...112 L i f e B o o k P S e r i e s N o t e b o o k I n d e x ...
Page 119: ......
Page 120: ......