Chapter 2: System Setup
2-3
Figure 2-1. Accessing the Inside of the System
1
3
1
6
2
2
1
5