Chapter 3: configuring the unit – Psion Teklogix Win CE 4.2 User Manual
Page 6
Contents
ii
Psion Teklogix NETBOOK PRO Win CE 4.2 User Manual
Inserting And Removing A Compact Flash Card . . . . . . . 26
Inserting And Removing A PCMCIA Card . . . . . . . . . . 27
Connecting USB Accessories . . . . . . . . . . . . . . . . . . . . . . 28
The Start Button And Taskbar . . . . . . . . . . . . . . . . . . . . . . 29
Resetting The NETBOOK PRO. . . . . . . . . . . . . . . . . . . . . 30
Performing A Soft Reset . . . . . . . . . . . . . . . . . . . . 31
Performing A Hard Reset . . . . . . . . . . . . . . . . . . . . 32
2.10 First Steps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
2.10.1 Navigating Between Files And Folders. . . . . . . . . . . . . 33
2.10.2 Starting Programs . . . . . . . . . . . . . . . . . . . . . . . . 34
2.10.3 Programs And Files . . . . . . . . . . . . . . . . . . . . . . . 34
2.10.4 Entering Information . . . . . . . . . . . . . . . . . . . . . . 34
2.10.5 Using Menus . . . . . . . . . . . . . . . . . . . . . . . . . . 34
2.10.6 Using Dialogs . . . . . . . . . . . . . . . . . . . . . . . . . . 35
2.10.6.1 Dialog Buttons . . . . . . . . . . . . . . . . . . . . 36
2.10.7 Copying Information Between Programs. . . . . . . . . . . . 36
Chapter 3: Configuring The Unit
Things To Do First. . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
Entering Owner and Password Information . . . . . . . . . . 39
Setting The Time, Date, And Time Zone . . . . . . . . . . . . 39
Things To Do Next . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
Setting Up ActiveSync . . . . . . . . . . . . . . . . . . . . . 40
3.2.1.1 Partnerships . . . . . . . . . . . . . . . . . . . . . . 40
3.2.1.2 Connecting Via RS232 Serial. . . . . . . . . . . . . 41
3.2.1.3 Connecting Via Infrared (IrDA) . . . . . . . . . . . 42
3.2.1.4 Connecting Via Ethernet (802.11b). . . . . . . . . . 42
Backing Up To A PC . . . . . . . . . . . . . . . . . . . . . . 43
Exploring The Control Panel . . . . . . . . . . . . . . . . . . 44
3.2.4
Securing Your Information . . . . . . . . . . . . . . . . . . . 45