A300

Using the microphone

You can use the built-in or an external microphone that connects to the microphone jack to record monaural sounds into your applications. It can also be used to issue voice commands to applications that support such functions. (Built-in microphone is provided with some models)

Since your computer has a microphone and speaker, “feedback” may be heard under certain conditions. Feedback occurs when sound from the speaker is picked up in the microphone and amplified back to the speaker, which amplifies it again to the microphone.

This feedback occurs repeatedly and causes a very loud, high-pitched noise. It is a common phenomenon that occurs in any sound system when the microphone input is output to the speaker (throughput) and the speaker volume is too loud or too close to the microphone. You can control throughput by adjusting the volume of your speaker or through the Mute function in the Master Volume panel. Refer to your Windows documentation for details on using the Master Volume panel.

Using TOSHIBA Face Recognition

If your computer is equipped with a web camera, the TOSHIBA Face Recognition feature can be used to verify the face of users when they log on to Windows. If the verification is successful, a user will be logged on to Windows automatically. The user can thus avoid having to enter a password, which makes the login process easier.

Notes

Please note the following hints when using TOSHIBA Face Recognition:

Changes of the likeness of a registrant such as hair style changes, wearing of a cap or wearing glasses may prevent a registrant from being recognized correctly. In this case, log on to Windows using your password.

Bright background light and/or shadows may prevent a registrant from being recognized correctly. In this case, log on to Windows using your password.

Faces similar to a registrant’s may be recognized accidently.

Do not use TOSHIBA Face Recognition for high-security purposes. It is not a suitable substitute for Windows password security. Use your established Windows passwords for security-sensitive log on.

User’s Manual

4-25