Using Screen Lock ........................................................................................................................................ P.8-3
Using Secret Mode ....................................................................................................................................... P.8-4