Справочник Пользователя для IEI Integration Corp. ICEFIRE-T10A
ICEFIRE-T10A Mobile Clinic Assistant
Page x
Figure 5-9: Action - Windows Key Action .............................................................................. 62
Figure B-1: IEI One Key Recovery Tool Menu ........................................................................ 92
Figure B-2: Launching the Recovery Tool ............................................................................. 96
Figure B-3: Recovery Tool Setup Menu ................................................................................. 97
Figure B-4: Command Mode ................................................................................................... 97
Figure B-5: Partition Creation Commands ............................................................................. 98
Figure B-6: Launching the Recovery Tool ........................................................................... 100
Figure B-7: System Configuration for Windows .................................................................. 100
Figure B-8: Build-up Recovery Partition .............................................................................. 101
Figure B-9: Press any key to continue ................................................................................. 101
Figure B-10: Press F3 to Boot into Recovery Mode............................................................. 102
Figure B-11: Recovery Tool Menu ........................................................................................ 102
Figure B-12: About Symantec Ghost Window ..................................................................... 103
Figure B-13: Symantec Ghost Path ...................................................................................... 103
Figure B-14: Select a Local Source Drive............................................................................. 104
Figure B-15: Select a Source Partition from Basic Drive ..................................................... 104
Figure B-16: File Name to Copy Image to ............................................................................. 105
Figure B-17: Compress Image .............................................................................................. 105
Figure B-18: Image Creation Confirmation .......................................................................... 106
Figure B-19: Image Creation Process................................................................................... 106
Figure B-20: Image Creation Complete ................................................................................ 106
Figure B-21: Press Any Key to Continue.............................................................................. 107
Figure B-22: Partitions for Linux .......................................................................................... 108
Figure B-23: System Configuration for Linux ...................................................................... 109
Figure B-24: Access menu.lst in Linux (Text Mode) ............................................................ 109
Figure B-25: Recovery Tool Menu ........................................................................................ 110
Figure B-26: Recovery Tool Main Menu ............................................................................... 111
Figure B-27: Restore Factory Default ................................................................................... 112
Figure B-28: Recovery Complete Window ........................................................................... 112
Figure B-29: Backup System ................................................................................................ 113
Figure B-30: System Backup Complete Window ................................................................. 113
Figure B-31: Restore Backup ................................................................................................ 114
Figure B-32: Restore System Backup Complete Window ................................................... 114
Figure B-33: Symantec Ghost Window ................................................................................ 115