Lenovo TC S51-8172 사용자 설명서

다운로드
페이지 60
v
   
System
 
Management
 
(SM)
 
BIOS
 
and
 
SM
 
software
 
v
   
Ability
 
to
 
store
 
POST
 
hardware
 
test
 
results
Input/output
 
features
 
v
   
1
 
PCI
 
Slot
 
v
   
1
 
PCI
 
Express
 
x1
 
slot
 
with
 
support
 
for
 
PCI-e
 
DVI-D
 
Connection
 
Adapter
 
v
   
25-pin
 
Parallel
 
Port
 
v
   
Two
 
9-pin
 
serial
 
connectors
 
v
   
Eight
 
USB
 
2.0
 
connectors
 
(two
 
on
 
front
 
panel
 
and
 
six
 
on
 
rear
 
panel)
 
v
   
PS/2
®
 
mouse
 
connector
 
v
   
PS/2
 
keyboard
 
connector
 
v
   
Ethernet
 
connector
 
v
   
VGA
 
monitor
 
connector
 
v
   
Two
 
audio
 
connectors
 
(line-in
 
and
 
line-out)
 
on
 
rear
 
panel
 
v
   
Two
 
audio
 
connectors
 
(microphone
 
and
 
headphone)
 
on
 
front
 
panel
Expansion
 
v
   
One
 
132-bit
 
PCI
 
slot
 
v
   
One
 
PCI
 
Express
 
x1
 
slot
 
with
 
support
 
for
 
PCI-e
 
DVI-D
 
Connection
 
Adapter
 
v
   
Two
 
DIMM
 
memory
 
connectors
Power
 
v
   
225
 
Watt
 
power
 
supply
 
with
 
manual
 
voltage
 
selection
 
switch
 
v
   
Automatic
 
50/60
 
Hz
 
input
 
frequency
 
switching
 
v
   
Advanced
 
Power
 
Management
 
support
 
v
   
Advanced
 
Configuration
 
and
 
Power
 
Interface
 
(ACPI)
 
support
Security
 
features
 
The
 
IBM
 
Embedded
 
Security
 
Subsystem
 
(ESS)
 
is
 
a
 
security
 
subsystem
 
included
 
on
 
IBM
 
ThinkCentre
 
PCs.
 
It
 
consists
 
of
 
a
 
dedicated
 
Hardware
 
Security
 
Module
 
built
 
on
 
to
 
the
 
motherboard
 
and
 
Client
 
Security
 
Software,
 
a
 
free,
 
web-downloaded
 
application.
 
ESS
 
provides
 
the
 
following
 
security
 
values
 
by
 
enhancing
 
the
 
security
 
of:
 
v
   
data
 
stored
 
on
 
the
 
PC
 
by
 
providing
 
an
 
encryption
 
application
 
(File
 
and
 
Folder
 
Encryption)
 
or
 
encryption
 
products
 
from
 
ISVs
 
(such
 
as
 
products
 
from
 
Utimaco
 
Safeware)
 
v
   
digital
 
certificates
 
and
 
other
 
digital
 
identity
 
information
 
stored
 
on
 
a
 
PC
 
v
   
VPN
 
products
 
from
 
Cisco,
 
Check
 
Point
 
and
 
3Com
 
by
 
increasing
 
the
 
protection
 
around
 
login
 
credentials
 
these
 
products
 
use
 
v
   
customer
 
network
 
by
 
providing
 
unique
 
machine
 
identifiers
 
for
 
PCs
 
in
 
the
 
network
 
(by
 
associating
 
certificates
 
with
 
the
 
built-in
 
Hardware
 
Security
 
Module)
Other
 
security
 
features
 
include:
 
v
   
User
 
and
 
administrator
 
passwords
 
v
   
Support
 
for
 
the
 
addition
 
of
 
a
 
cable
 
lock
 
such
 
as
 
a
 
Kensington
 
lock
 
v
   
Knockout
 
holes
 
for
 
installing
 
a
 
rope
 
clip
 
(U-bolt)
 
v
   
Optional
 
keylock
 
on
 
top
 
cover
 
v
   
Startup
 
sequence
 
control
   
Chapter
 
1.
 
Overview
 
3