Foxconn G41MXE English Manual. - Page 32
► Floppy Drive Seek, ► Bootup Num-Lock, ► Boot Device Priority, ► Removable Drives, ► Trusted
View all Foxconn G41MXE manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 32 highlights
3 While Enabled, this option allows BIOS to skip certain tests while booting, this will shorten the time needed to boot the system. ► Floppy Drive Seek This item controls whether the BIOS will be checking for a floppy drive while booting up. If it cannot detect one (either due to improper configuration or physical unavailability), it will appear an error message. Disabling this function, then POST will not detect the floppy. ► Bootup Num-Lock This item defines if the keyboard Num Lock key is active when your system is started. The available settings are: On (default) and Off. ► Boot Device Priority This option is used to select the priority for boot devices. After pressing , you can select the device using the Up/Down arrow keys, and change the device priority using or ; you can exit this menu by pressing . ► Removable Drives This option is used to specify the boot priority sequence from available removable drives. ► Trusted Computing Press to go to its submenu. CMOS Setup Utility - Copyright (C) 1985-2008, American Megatrends, Inc. Trusted Computing Trusted Computing Help Item TCG/TPM Support [No] Enable / Disable TPM TCG (TPM 1.1/1.2) support in BIOS Move Enter:Select +/-/:Value F10:Save ESC:Exit F1:General Help F9:Optimized Defaults ► TCG/TPM Support Trusted Computing Group (TCG) members develop and promote open, vendor-neutral, industry standard specifications for trusted computing building blocks and software interfaces across multiple platforms TPM (Trusted Platform Module) is a specification promoted by TCG. A Trusted Platform Module offers facilities for secure generation of cryptographic keys. The TPM Work Group is chartered to create the Trusted Platform Module (TPM) specification. The definition of the TPM architecture comes from the TC and the TPM Work Group defines the implementation of that architecture. Work group members should have a working knowledge of security in relation to the design and usage of cryptographic modules. Members should also have a working knowledge of cryptographic techniques including public-key cryptography, cryptographic algorithms and protocols. This item is used to enable/disable the function of TCG/TPM support. 25