Iei-integration AFL2-12A-D525 Instrukcja Użytkownika Strona 13

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 180
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 12
AFL2-12A-D525 Series Panel PC
Page XIII
Figure C-25: Building the Auto Recovery Partition................................................................ 152
Figure C-26: Factory Default Image Confirmation ................................................................. 152
Figure C-27: Image Creation Complete................................................................................... 153
Figure C-28: Press any key to continue .................................................................................. 153
Figure C-29: Partitions for Linux.............................................................................................. 155
Figure C-30: Manual Recovery Environment for Linux ......................................................... 156
Figure C-31: Access menu.lst in Linux (Text Mode).............................................................. 157
Figure C-32: Recovery Tool Menu ........................................................................................... 157
Figure C-33: Recovery Tool Main Menu.................................................................................. 158
Figure C-34: Restore Factory Default...................................................................................... 159
Figure C-35: Recovery Complete Window .............................................................................. 160
Figure C-36: Backup System.................................................................................................... 160
Figure C-37: System Backup Complete Window ................................................................... 161
Figure C-38: Restore Backup ................................................................................................... 161
Figure C-39: Restore System Backup Complete Window..................................................... 162
Figure C-40: Symantec Ghost Window ................................................................................... 162
Przeglądanie stron 12
1 2 ... 8 9 10 11 12 13 14 15 16 17 18 ... 179 180

Komentarze do niniejszej Instrukcji

Brak uwag