NB 100 Series

Using the microphone

You can use the built-in or an external microphone that connects to the microphone jack to record monaural sounds into your applications. It can also be used to issue voice commands to applications that support such functions.(Built-in microphone is provided with some models)

Since your computer has a microphone and speaker, “feedback” may be heard under certain conditions. Feedback occurs when sound from the speaker is picked up in the microphone and amplified back to the speaker, which amplifies it again to the microphone.

This feedback occurs repeatedly and causes a very loud, high-pitched noise. It is a common phenomenon that occurs in any sound system when the microphone input is output to the speaker (throughput) and the speaker volume is too loud or too close to the microphone. You can control throughput by adjusting the volume of your speaker or through the Mute function in the Master Volume panel. Refer to your Windows documentation for details on using the Master Volume panel.

Wireless communications

The computer’s wireless communication function supports both Wireless LAN and Bluetooth devices.

Wireless LAN

The Wireless LAN is compatible with other LAN systems based on Direct Sequence Spread Spectrum/Orthogonal Frequency Division Multiplexing radio technology that complies with IEEE 802.11 wireless LAN standard (Revision B and G).

Supported features. It supports the following features:

Automatic Transmit Rate Select mechanism in the transmit range of 54, 48, 36, 24, 18, 9 and 6 Mbit/s (Revision G).

Automatic Transmit Rate Select mechanism in the transmit range of 11, 5.5, 2 and 1 Mbit/s (Revision B).

Frequency Channel Selection (Revision B/G: 2.4GHz)

Roaming over multiple channels

Card Power Management

Wired Equivalent Privacy (WEP) data encryption, based on the 128 bit encryption algorithm (Atheros module type).

Security

Be sure to enable encryption function. Otherwise your computer will allow the illegal access by outsider through wireless LAN to cause illegal instruction, eavesdropping, and loss or destruction of stored data. TOSHIBA strongly recommends the customer to enable the encryption function.

4-6

User’s Manual