User's Manual Part 2

Settings 71
In the same screen, tapping the Items tab allows you to configure the individual Today
screen components that have been installed on your device.Your device will already sup-
port Date, Owner Info, Calendar, Inbox, and Tasks.All of these plug-ins with exception of
Date can be Moved Up or Moved Down vertically on the Today screen.Press the appropri-
ate button to the right to move the plug-ins' positions.
Speech Commander
Speech CommanderSpeech Commander
Speech Commander
Here you can enable or disable the voice dialing function of P50. To enable this function,
tap to check the Voice dialing checkbox. Check the Caller name playback checkbox if you
want P50 to play the caller name (voice tag) before dialing.
System settings
Tap S t a rt
Start Start
Start > Settings
Settings Settings
Settings > System
SystemSystem
System to enter the System settings page.
About
AboutAbout
About
This control panel gives you technical details about the version of Microsoft Pocket PC
running, processor type, and total available internal memory.
It also shows expansion slot (storage slot) usage and owner name.
In the same screen, tap the Device ID tab to change the name displayed when performing
an ActiveSync with a desktop PC.
Finally, the Copyrights tab reveals licenses being used by your version of Microsoft Pocket
PC.
Backlight
BacklightBacklight
Backlight
Tapping on Brightness icon presents the following screen. Here you can choose how many
minutes of inactivity will result in the backlight going off when no AC adapter is plugged
into your PDA phone. In the second of the two checkboxes, you can have the backlight
automatically turn on upon tapping the screen. The External Power tab provides the same
options as Battery Power, but these settings affect behavior when external power is used
such as an AC adapter or car power adapter.
Certificates
CertificatesCertificates
Certificates
Public key certificates allow you to help establish your identity when you are logging onto
a secure network. Certificates also aide in establishing the identity of other computers that
you might want to connect to. Using certificates helps prevent unauthorized users from