7566578568956865

Disponível somente no TrabalhosFeitos
  • Páginas : 55 (13686 palavras )
  • Download(s) : 0
  • Publicado : 8 de novembro de 2012
Ler documento completo
Amostra do texto
ThinkCentre™

User Guide
Types 8141, 8142, 8145
Types 8420, 8421, 8426

Th

ink

Ce

ntr

e

ThinkCentre™

User Guide
Types 8141, 8142, 8145
Types 8420, 8421, 8426

Note
Before using this information and the product it supports, be sure to read the “Important safety information” on page v and
Appendix D, “Notices,” on page 41.

Second Edition (May 2004)
© CopyrightInternational Business Machines Corporation 2004. All rights reserved.
US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract
with IBM Corp.

Contents
Important safety information . . . . . . v
Conditions that require immediate action . . . . . v
General safety guidelines . . . . . . . . . . vi
Service . . . . . . . . . . . . . . . viPower cords and power adapters . . . . . . vi
Extension cords and related devices . . . . . vii
Plugs and outlets . . . . . . . . . . . vii
Batteries . . . . . . . . . . . . . . vii
Heat and product ventilation . . . . . . . viii
CD and DVD drive safety . . . . . . . . viii
Additional safety information . . . . . . . . ix
Lithium battery notice . . . . . . . . . . . x
Modem safetyinformation . . . . . . . . . . x
Laser compliance statement . . . . . . . . . xi

Overview . . . . . . . . . . . . . xiii
Information resources .

.

.

.

.

.

.

.

.

.

© Copyright IBM Corp. 2004

Starting the IBM Setup Utility program . . .
Viewing and changing settings . . . . . .
Using passwords . . . . . . . . . .
Password considerations . . . . . . .
Userpassword . . . . . . . . . .
Administrator password . . . . . . .
IDE Drive User Password . . . . . .
IDE Drive Master Password . . . . . .
Setting, changing, and deleting a password .
Using Security Profile by Device . . . . .
Selecting a startup device . . . . . . . .
Selecting a temporary startup device . . .
Changing the startup sequence . . . . .
Exiting from the IBM Setup Utility program ..
.
.
.
.
.
.
.
.
.
.
.
.
.

.
.
.
.
.
.
.
.
.
.
.
.
.
.

25
25
25
25
26
26
26
26
27
27
27
28
28
28

. xiii

Chapter 1. Installing options . . . . . . 1
Features . . . . . . . . . . . . . .
Specifications . . . . . . . . . . . .
Available options . . . . . . . . . . .
Tools required . . . . . . . . . . . .
Handling static-sensitive devices .. . . . .
Installing external options . . . . . . . .
Locating the connectors on the front of your
computer . . . . . . . . . . . .
Locating the connectors on the rear of your
computer . . . . . . . . . . . .
Obtaining device drivers . . . . . . .
Removing the cover . . . . . . . . .
Locating components . . . . . . . . .
Identifying parts on the system board . . .
Installing memory . . .. . . . . . .
Installing adapters . . . . . . . . . .
Installing internal drives . . . . . . . .
Drive specifications . . . . . . . . .
Installing a drive . . . . . . . . .
Installing security features . . . . . . .
Identifying security locks . . . . . . .
Padlock loop . . . . . . . . . . .
Integrated cable lock . . . . . . . .
Password protection . . . . . . . .
Changing the battery .. . . . . . . .
Erasing a lost or forgotten password (clearing
CMOS) . . . . . . . . . . . . . .
Replacing the cover and connecting the cables .

Chapter 2. Using the IBM Setup Utility
program . . . . . . . . . . . . . . 25

.
.
.
.
.
.

.
.
.
.
.
.

1
4
5
5
5
6

.

.7

.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.

.8
.9
. 10
. 11
. 11
. 12
. 14
. 16
.16
. 17
. 20
. 20
. 21
. 22
. 22
. 22

.
.

Appendix A. Updating system
programs . . . . . . . . . . . . . 29

. 23
. 24

System programs . . . . . . . . . . .
Updating (flashing) BIOS from a diskette . .
Updating (flashing) BIOS from your operating
system . . . . . . . . . . . . . .
Recovering from a POST/BIOS update failure . .

. 29
. 29
. 29
. 30

Appendix B....
tracking img