Toshiba Satellite U500 PSU82C-02M00G Users Manual Canada; English - Page 90

Using the microphone, Using Face Recognition, Note on Use, Disclaimer

Page 90 highlights

Operating Basics Using the microphone Your computer has a built-in microphone that can be used to record monaural sounds into your applications. It can also be used to issue voice commands to applications that support such functions.(Built-in microphone is provided with some models) Since your computer has a built-in microphone and speaker, "feedback" may be heard under certain conditions. Feedback occurs when sound from the speaker is picked up in the microphone and amplified back to the speaker, which amplifies it again to the microphone. This feedback occurs repeatedly and causes a very loud, high-pitched noise. It is a common phenomenon that occurs in any sound system when the microphone input is output to the speaker (throughput) and the speaker volume is too loud or too close to the microphone. You can control throughput by adjusting the volume of your speaker or through the Mute function in the Master Volume panel. Refer to your Windows documentation for details on using the Master Volume panel. Using Face Recognition Face Recognition uses a face verification library to verify the face data of users when they log in to Windows. The user can thus avoid having to enter a password or the like, which makes the login process easier. This software is pre-installed with some models. Note on Use n Face Recognition does not guarantee the correct identification of a user. Changes to the likeness of a registrant, such as hair style changes, wearing a cap, or wearing glasses may affect the recognition rates when such changes occur after the registrant had registered. n Face Recognition may incorrectly recognize faces that are similar to a registrant. n For high security purposes, Face Recognition is not a suitable substitute for Windows passwords. When security is a high priority, use your established Windows passwords to log in. n Bright background light and/or shadows may prevent a registrant from being recognized correctly. In that case, log in using your Windows password. If recognition of a registrant fails repeatedly, refer to your computer documentation to learn ways to improve recognition performance. Disclaimer TOSHIBA does not guarantee that the face recognition utility technology willbe completely secure or error-free. TOSHIBA does not guarantee that the face recognition utility will accurately screen out unauthorized users at all times. Toshiba is not liable for any failure or damage that might arise out of the use of the face recognition software or utility. 4-14 User's Manual

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224

User’s Manual
4-14
Operating Basics
Using the microphone
Your computer has a built-in microphone that can be used to record monaural
sounds into your applications. It can also be used to issue voice commands to
applications that support such functions.(Built-in microphone is provided with
some models)
Since your computer has a built-in microphone and speaker, “feedback” may be
heard under certain conditions. Feedback occurs when sound from the speaker is
picked up in the microphone and amplified back to the speaker, which amplifies it
again to the microphone.
This feedback occurs repeatedly and causes a very loud, high-pitched noise. It is
a common phenomenon that occurs in any sound system when the microphone
input is output to the speaker (throughput) and the speaker volume is too loud or
too close to the microphone. You can control throughput by adjusting the volume
of your speaker or through the Mute function in the Master Volume panel. Refer to
your Windows documentation for details on using the Master Volume panel.
Using Face Recognition
Face Recognition uses a face verification library to verify the face data of users
when they log in to Windows. The user can thus avoid having to enter a password
or the like, which makes the login process easier. This software is pre-installed
with some models.
Note on Use
n
Face Recognition does not guarantee the correct identification of a user.
Changes to the likeness of a registrant, such as hair style changes, wearing a
cap, or wearing glasses may affect the recognition rates when such changes
occur after the registrant had registered.
n
Face Recognition may incorrectly recognize faces that are similar to a
registrant.
n
For high security purposes, Face Recognition is not a suitable substitute for
Windows passwords. When security is a high priority, use your established
Windows passwords to log in.
n
Bright background light and/or shadows may prevent a registrant from being
recognized correctly. In that case, log in using your Windows password.
If recognition of a registrant fails repeatedly, refer to your computer
documentation to learn ways to improve recognition performance.
Disclaimer
TOSHIBA does not guarantee that the face recognition utility technology willbe
completely secure or error-free. TOSHIBA does not guarantee that the face
recognition utility will accurately screen out unauthorized users at all times.
Toshiba is not liable for any failure or damage that might arise out of the use of the
face recognition software or utility.