DELL 1950 User Manual

Page of 160
38
Using the System Setup Program
Exit Screen
After you press <Esc> to exit the System Setup program, the Exit screen displays the following options:
Save Changes and Exit
Discard Changes and Exit
Return to Setup
System and Setup Password Features
 
NOTICE: 
The password features provide a basic level of security for the data on your system. If your data 
requires more security, use additional forms of protection, such as data encryption programs. 
 
NOTICE: 
Anyone can access the data stored on your system if you leave the system running and unattended 
without having a system password assigned or if you leave your system unlocked so that someone can disable the 
password by changing a jumper setting.
Your system is shipped to you without the system password feature enabled. If system security is a concern, 
operate your system only with system password protection. 
To change or delete an existing password, you must know the password (see "Deleting or Changing an 
Existing System Password" on page 40). If 
you forget your password, you cannot operate your system or 
change settings in the System Setup program until a trained service technician changes the password jumper 
setting to disable the passwords, and erases the existing passwords. This procedure is described in 
"Disabling a Forgotten Password" on page 117.
Using the System Password
After a system password is assigned, only those who know the password have full use of the system. When 
the System Password option is set to Enabled, the system prompts you for the system password after the 
system starts.
Assigning a System Password
Before you assign a system password, enter the System Setup program and check the System Password 
option.
AC Power Recovery
(Last default)
Determines how the system reacts when power is restored to the system. If system is 
set to Last, the system returns to the last power state. On turns on the system after 
power is restored. When set to Off, the system remains off after power is restored.
Table 2-5.
System Security Screen Options (continued)
Option
Description