Đang chuẩn bị nút TẢI XUỐNG, xin hãy chờ
Tải xuống
Sử dụng nút Power: Thay đổi Bất kể cho dù bạn đang sử dụng một máy tính để bàn hoặc máy tính di động, cách nút Power hoạt động phụ thuộc vào hệ thống phần cứng, hệ thống nhà nước, và cấu hình hệ thống: | Chapter 9 Protecting User Accounts and Using Parental Controls 133 Consolidator Performs automated consolidation of the computer s event logs. AutomaticDefrag Performs automatic defragmentation of the computer s hard disks. AutomaticBackup Performs automatic backup of the computer once configured . In earlier versions of Windows nonadministrators couldn t easily tell whether they were allowed to perform an action. To make it easier for users to determine whether they can perform a task Windows Vista uses a shield icon to identify tasks that require administrator privileges. In Figure 9-1 two tasks are preceded by a shield icon Change Settings and Change Product Key. These tasks require administrator privileges. Figure 9-1 The shield icon indicates tasks that require administrator privileges From the experts Only legacy applications need the Power Users group The terms legacy application and legacy operating systems take on new meanings with the introduction of Windows Vista. In Windows Vista legacy application refers to an application developed for Windows XP or an earlier version of Windows and legacy operating system refers to an operating system using Windows XP or an earlier version of Windows. In earlier versions of Windows the Power Users group was designed to give users specific administrator privileges to perform basic system tasks while running 134 Part III Securing Windows Vista applications. As standard user accounts can now perform most common configuration tasks Windows Vista does not require the use of the Power Users group. Further while Windows Vista maintains the Power Users group for legacy application compatibility applications written for Windows Vista do not require the use of the Power User mode. Legacy applications that require administrative privileges use file and registry virtualization compliant applications use standard user mode and adminis trator mode as discussed previously. For more information about legacy application compatibility