all | frequencies |
|
|
|
exhibits | applications |
---|---|---|---|---|---|---|
manuals |
app s | submitted / available | |||||||
---|---|---|---|---|---|---|---|---|
various |
|
User Manual | Users Manual | 4.97 MiB | ||||
various |
|
User manual (statement) | Users Manual | 1.02 MiB | ||||
various |
|
User manual 2 of 2 | Users Manual | 4.99 MiB | August 09 2017 / July 03 2018 | |||
various | Cover Letter(s) | |||||||
various | Cover Letter(s) | |||||||
various | External Photos | |||||||
various | Cover Letter(s) | |||||||
various | Cover Letter(s) | |||||||
various | Internal Photos | |||||||
various | Cover Letter(s) | |||||||
various | Cover Letter(s) | |||||||
various | RF Exposure Info | |||||||
various | Test Setup Photos | |||||||
various | ID Label/Location Info | |||||||
various | Cover Letter(s) | August 09 2017 | ||||||
various | Cover Letter(s) | August 09 2017 | ||||||
various | Cover Letter(s) | August 09 2017 | ||||||
various | ID Label/Location Info | August 09 2017 | ||||||
various | RF Exposure Info | August 09 2017 | ||||||
various | Attestation Statements | August 09 2017 | ||||||
various | Cover Letter(s) | August 09 2017 | ||||||
various | Test Setup Photos | August 09 2017 / July 03 2018 | ||||||
various | Cover Letter(s) | August 09 2017 | ||||||
various | Cover Letter(s) | October 08 2017 | ||||||
various | Cover Letter(s) | October 08 2017 | ||||||
various | ID Label/Location Info | October 08 2017 | ||||||
various | ID Label/Location Info | October 08 2017 | ||||||
various | Cover Letter(s) | October 08 2017 | ||||||
various | Cover Letter(s) | October 08 2017 |
various | User Manual | Users Manual | 4.97 MiB |
USERS MANUAL 2 -
2017. All Rights Reserved. Spin 5 Covers: SP515-51N / SP515-51GN This revision: July 2017 Important This manual contains proprietary information that is protected by copyright laws. The information contained in this manual is subject to change without notice. Some features described in this manual may not be supported depending on the Operating System version. Images provided herein are for reference only and may contain information or features that do not apply to your computer. Acer Group shall not be liable for technical or editorial errors or omissions contained in this manual. Sign up for an Acer ID and enjoy great benefits Open the Acer Portal app to sign up for an Acer ID or sign in if you already have an Acer ID. There are three great reasons for you to get an Acer ID:
Create your own connected world. Get the latest offers and product information. Register your device for quick, personalized customer support. For more information, please visit the Acer BYOC website:
www.acer.com/byoc-start Model number: _________________________________ Serial number: _________________________________ Date of purchase: ______________________________ Place of purchase: ______________________________ TABLE OF CONTENTS Table of contents - 3 5 First things first Your guides ............................................. 5 Basic care and tips for using your computer.................................................. 5 Turning your computer off........................... 5 Taking care of your computer ..................... 6 Taking care of your AC adapter.................. 7 Cleaning and servicing................................ 7 Your Acer notebook tour 8 Screen view............................................. 8 Keyboard view......................................... 9 Back view .............................................. 10 Base view .............................................. 10 Left view ............................................... 11 USB Type-C information........................... 11 USB 3.0 information.................................. 11 Right view.............................................. 12 Using the keyboard 13 Lock keys............................................... 13 Special keys.............................................. 13 Hotkeys..................................................... 14 Windows keys........................................ 15 Using the Precision Touchpad 16 Touchpad gestures................................ 16 Changing touchpad settings.................. 18 Recovery 20 Creating a factory default backup.......... 20 Backing up your wireless and LAN drivers.................................................... 23 Restoring your computer ....................... 23 Reset this PC and keep my files............... 23 Reset this PC and remove everything ...... 24 27 Using a Bluetooth connection Enabling and disabling Bluetooth .......... 27 Enable Bluetooth and add a device .......... 27 Connecting to the Internet 29 Connecting to a wireless network.......... 29 Connecting to a wireless LAN................... 29 33 Bluelight Shield Securing your computer 35 Using a computer security lock.............. 35 Using passwords ................................... 35 Entering passwords .................................. 36 Fingerprint Reader 37 How to use the fingerprint reader .......... 37 BIOS utility 42 Boot sequence....................................... 42 Setting passwords ................................. 42 43 Power management Saving power......................................... 43 Battery pack 45 Battery characteristics ........................... 45 Charging the battery ................................. 45 Optimizing battery life ............................... 46 Checking the battery level......................... 47 Battery-low warning .................................. 47 Traveling with your computer 48 Disconnecting from the desktop ............ 48 Moving around....................................... 48 Preparing the computer ............................ 48 What to bring to meetings......................... 49 Taking the computer home.................... 49 Preparing the computer ............................ 49 What to take with you................................ 50 Special considerations.............................. 50 Setting up a home office ........................... 50 Traveling with the computer................... 51 Preparing the computer ............................ 51 What to take with you................................ 51 Special considerations.............................. 51 Traveling internationally......................... 51 Preparing the computer ............................ 52 What to bring with you .............................. 52 Special considerations.............................. 52 54 Universal Serial Bus (USB) 55 USB Type-C port 56 SD card reader Video and audio connectors 57 Connecting a monitor............................. 57 Headphones and microphone................ 57 HDMI 58 Frequently asked questions 60 Requesting service ................................ 62 Tips and hints for using Windows 10..... 63 How do I get to Start? ............................... 63 How do I turn off my computer?................ 63 How do I unlock my computer?................. 63 How do I set the alarm?............................ 65 Where are my apps?................................. 65 What is a Microsoft ID (account)?............. 66 How do I check for Windows updates?..... 67 Where can I get more information?........... 67 Internet and online security 68 First steps on the net ............................. 68 Protecting your computer.......................... 68 Choose an Internet Service Provider........ 68 Network connections................................. 70 Surf the Net!.............................................. 71 Internet security software.......................... 72 Getting started... In this section you will find:
Useful information on caring for your computer and your health Where to find the power button, ports and connectors Tips and tricks for using the touchpad and keyboard How to create recovery backups Guidelines for connecting to a network and using Bluetooth Information on using Acers bundled software FIRST THINGS FIRST First things first - 5 We would like to thank you for making this Acer notebook your choice for meeting your mobile computing needs. Your guides To help you use your Acer notebook, we have designed a set of guides:
First off, the Setup Guide helps you get started with setting up your computer. The Quick Guide introduces you to the basic features and functions of your new computer. For more on how your computer can help you to be more productive, please refer to the Users Manual. This guide contains detailed information on such subjects as system utilities, data recovery, expansion options and troubleshooting. Once you have connected to the internet, you can download updates for your computer from:
http://go.acer.com/?id=17883 1. The link will open the Acer Service & Support webpage. 2. Scroll down to Drivers and Manuals and search for your model by pasting in or manually entering the serial number, SNID, or product model. 3. From this page you can also download and install the Acer identification utility that will automatically detect your computers serial number and SNID and allow you to copy it to the clipboard. 4. Once you have found your product model, any updates, or documents will be listed. Basic care and tips for using your computer Turning your computer off To turn the power off, do any of the following:
Use the Windows shutdown command: Press the Windows key or select the Windows Start button, select Power > Shut down. 6 - First things first Right-click the Windows Start button > Shut down or sign out >
Shut down. If you need to power down the computer for a short while, but dont want to completely shut it down, you can put it to Sleep by doing any of the following:
Press the power button. Press the sleep hotkey. Press the Windows key or select the Windows Start button, select Power > Sleep. Right-click the Windows Start button > Shut down or sign out >
Sleep. Note If you cannot power off the computer normally, press and hold the power button for up to ten seconds to shut down the computer. If you turn off the computer and want to turn it on again, wait at least two seconds before powering up. Taking care of your computer Your computer will serve you well if you take care of it. Only use the adapter provided with your device, or an Acer-
approved adapter to power your device. Do not expose the computer to direct sunlight. Do not place it near sources of heat, such as a radiator. Do not expose the computer to temperatures below 0 C (32 F) or above 50 C (122 F). Do not subject the computer to magnetic fields. Do not expose the computer to rain or moisture. Do not spill water or any liquid on the computer. Do not subject the computer to heavy shock or vibration. Do not expose the computer to dust or dirt. Never place objects on top of the computer. Do not slam the computer display when you close it. Never place the computer on uneven surfaces. Taking care of your AC adapter First things first - 7 Here are some ways to take care of your AC adapter:
Do not connect the adapter to any other device. Do not step on the power cord or place heavy objects on top of it. Route the power cord and any cables away from where people walk. When unplugging the power cord, do not pull on the cord itself but pull on the plug. The total ampere ratings of the equipment plugged in should not exceed the ampere rating of the cord if you are using an extension cord. Also, the total current rating of all equipment plugged into a single wall outlet should not exceed the fuse rating. Cleaning and servicing When cleaning the computer, follow these steps:
1.Turn off the computer. 2.Disconnect the AC adapter. 3.Use a soft, moist cloth. Do not use liquid or aerosol cleaners. If your computer is dropped or visibly damaged, or does not work normally, please contact your nearest authorized Acer service center. 8 - Your Acer notebook tour YOUR ACER NOTEBOOK TOUR After setting up your computer as illustrated in the Setup Guide, let us show you around your new Acer computer. Screen view 1 2 3
#
1 2 3 Icon Item Microphones Webcam Touchscreen Description 4 array microphones for far-field technology that allows users to access Cortana up to 4 meters away. Web camera for video communication. A light next to the webcam indicates that the webcam is active. Displays computer output, supports multi-touch and Active Pen input(Active Pen support depends on model purchased). Keyboard view Your Acer notebook tour - 9 1 2 3 4
#
1 2 3 4 Icon Item Speakers Keyboard Fingerprint reader Touchpad Description Deliver stereo audio output. For entering data into your computer. See "Using the keyboard" on page 13. Fingerprint reader for Windows Hello and security. Touch-sensitive pointing device. The touchpad and selection buttons form a single surface. Press down firmly on the touchpad surface to perform a left click. Press down firmly on the lower right corner to perform a right click. 10 - Your Acer notebook tour Back view 1
#
1 2 Icon Item Ventilation and cooling fan Speakers 2 Description Allows the computer to stay cool. Do not cover or obstruct the openings. Deliver stereo audio output. Base view 1 2
#
1 2 Icon Item Battery reset pinhole Ventilation and cooling fan Description Simulates removing and reinstalling the battery. Insert a paperclip into the hole and press for four seconds. Allows the computer to stay cool. Do not cover or obstruct the openings. Left view 1 2 3 4 5 Icon Item DC-in jack HDMI port USB Type-C port with DC-in USB port USB port with power-off charging
#
1 2 3 4 5 USB Type-C information Your Acer notebook tour - 11 Description Connects to an AC adapter. Supports high-definition digital video connections. Connects to the provided USB Type-
C power adapter and to USB devices with a USB Type-C connector. Supports DisplayPort over USB-C. Connects to USB devices. Connects to USB devices. USB 3.1 Gen 1 with transfer speeds up to 5 Gbps. Supports DisplayPort audio/video output. Delivers up to 3 A at 5 V DC for USB charging. DC-in: requires power adapter or power source providing 45 W at 20 V. For optimal performance, please use a certified Acer power adapter or USB Power Delivery device. USB 3.0 information USB 3.0 compatible ports are blue. Compatible with USB 3.0 and earlier devices. For optimal performance, use USB 3.0-certified devices. Defined by the USB 3.0 specification (SuperSpeed USB). 12 - Your Acer notebook tour Right view 1 2 3 4 5 6 7
#
1 2 3 4 5 6 7 Icon Item
+ / -
Power indicator Battery indicator Description Indicates the computers power status. Indicates the computers battery status. Charging: The light shows amber when the battery is charging. Fully charged: The light shows blue when in AC mode. Adjusts the system volume. Connects to audio devices (e.g., speakers, headphones) or a headset with microphone. Accepts one Secure Digital (SD or SDHC) card. Only one card can operate at a time. USB port Connects to USB devices. Power button Turns the computer on and off. Noble lock slot Connects to a Noble-compatible Volume control key Headset/
speaker jack SD card reader security lock. USING THE KEYBOARD Using the keyboard - 13 The keyboard has full-sized keys and a separate numeric keypad, separate cursor, lock, Windows, function and special keys. Lock keys The keyboard has lock keys which you can use to turn keyboard functions on and off. Lock key Caps Lock Description When Caps Lock is on, all alphabetic characters typed are in uppercase. When Num Lock is on, the keypad is in numeric mode. The keys function as a calculator (complete with the arithmetic operators +, -, *, and /). Use this mode when you need to do a lot of numeric data entry. When Scroll Lock is on, the screen moves one line up or down when you press the up or down arrow keys respectively. Scroll Lock does not work with some applications. Num Lock Scroll Lock Special keys includes keys Your computers keyboard functions. The function of each key is clearly marked with an icon. Icon Function Fn Hotkey for that activate special Description Activates a second function on certain keys. E.g. press the Fn key to activate the F1 to F12 keys. Puts the computer in Sleep mode. Turns on / off the computer's network devices. Sleep Airplane mode second function Brightness down Decreases the screen brightness. 14 - Using the keyboard Icon Function Display off Brightness up Display toggle Description Increases the screen brightness. Switches display output between the display screen, external monitor (if connected) and both. Turns the display screen backlight off to save power. Press any key to return. Touchpad toggle Turns the built-in touchpad on and off. Keyboard backlight toggle Turns the keyboard backlight on and off. Speaker toggle Turns the speakers on and off. Volume down Decreases the sound volume. Increases the sound volume. Volume up Turns Scroll Lock on or off. Scr Lk Scroll Lock Pause Break Pause / Break Sends a Break Command. Turns Insert on or off. Insert Insert Scrolls to the beginning of a document. Home Home Pg Up Page up Scrolls up a page in a document. Scrolls down a page in a document. Pg Dn Page down End End Scrolls to the end of a document. Hotkeys The computer uses hotkeys (key combinations) to access function keys and navigation commands. To activate hotkeys, press and hold the Fn key before pressing the other key in the hotkey combination. Hotkey Fn + Special keys (see page 13) Fn +
Fn +
Function Function keys Activates the F1 to F12 keys. Play/Pause Stop Description Using the keyboard - 15 Hotkey Fn +
Fn +
Function Description Previous Next Note It is not necessary to press the Fn key to use the F1 to F12 function keys when starting your computer or when using the BIOS. To swap the hotkey and special function of the F1 to F12 keys, change the function key setting in the BIOS (to open the BIOS press F2 when starting your computer, then select the Main menu and change Function key behavior to Function keys). Windows keys The keyboard has two keys that perform Windows-specific functions. Key Windows key Application key Description Pressed alone it returns to the Start screen or to return to the last open app. It can also be used with other keys for special functions, please check Windows Help. This key has the same effect as clicking the right mouse button; it opens the application's context menu. 16 - Using the Precision Touchpad USING THE PRECISION TOUCHPAD The touchpad controls the arrow
(or 'cursor') on the screen. As you slide your finger across the touchpad, the cursor will follow this movement. The Precision Touchpad (PTP) is designed to provide a more uniform, smooth, and accurate touchpad experience. Many applications support precision touchpad gestures that use one or more fingers, however, some gestures may not be supported by the specific application or program you are using. Touchpad gestures Single-finger slide Slide a finger across the touchpad to move the cursor. Single-finger press or tap Press the touchpad down, or lightly tap the touchpad with your finger, to perform a 'click', which will select or start an item. Quickly repeat the tap to perform a double tap or
'double click'. Two-finger press Lightly tap the touchpad with two fingers to perform a
'right click'. In the Start screen, this will toggle the app commands. In most apps this will open a context menu related to the selected item. Two-finger slide Swiftly scroll through web pages, documents and playlists by placing two fingers on the touchpad and moving both in any direction. Two-finger pinch Zoom in and out of photos, maps and documents with a simple finger-and-thumb gesture. Using the Precision Touchpad - 17 Three-finger press Lightly tap the touchpad with three fingers to open Cortana
(if your computer supports Cortana) or open the Action Center (if your computer does not support Cortana). Three-finger swipe Swipe across the touchpad with three fingers. Swipe up to open Task View. Move the cursor over a window and tap the touchpad to select that window, or swipe downwards to exit Task View. Swipe down to minimize all open windows and show Desktop; swipe upwards to restore the minimized windows. Swipe left or right to switch between open windows. Four-finger press Lightly tap the touchpad with four fingers to open the Action Center. Four-finger swipe Swipe across the touchpad with four fingers. Swipe up to open Task View. Move the cursor over a window and tap the touchpad to select that window, or swipe downwards to exit Task View. Swipe down to minimize all open windows and show Desktop; swipe upwards to restore the minimized windows. Swipe left or right to switch between open desktops. The precision touchpad includes added technology features that help recognize and prevent unintentional gestures such as accidental taps, gestures, and pointer movement. Note The touchpad is sensitive to finger movement; the lighter the touch, the better the response. Please keep the touchpad and your fingers dry and clean. 18 - Using the Precision Touchpad Changing touchpad settings To change the touchpad settings to suit your personal requirements, please do the following. 1.In the icon tray in the lower right-hand corner of the screen, select the Notifications icon to open the Notifications pane. 2.Select All settings. 3.Select Devices > Mouse & touchpad. 4.Now you can adjust the settings to suit your personal needs. You can change the primary button for left- or right-handed use, turn the touchpad off if you prefer to use a mouse, or set a delay to prevent the cursor from moving if you accidentally tap the touchpad with your palm while working. Scroll down to see more settings. Using the Precision Touchpad - 19 20 - Recovery RECOVERY If you are having trouble with your computer, and the frequently asked questions (see Got a question? on page 59) do not help, you can recover your computer. This section describes the recovery tools available on your computer. Acer provides Acer Care Center, which allows you to reset your PC, refresh your PC, or create a factory default backup. If you cannot access Acer Care Center, go to Action Center. Or, click Settings in the Start menu, select Update & security and then click Recovery. Note Acer Care Center vary depending on model or Operating System. Important We recommend that you create a Factory Default Backup as soon as possible. In certain situations a full recovery will require a USB recovery backup. Creating a factory default backup Backup allows you to quickly and easily back up your operating system, installed apps and data. 1.From Start, select All apps then Acer. Select Acer Recovery Management in the list of Acer apps. Note Since the recovery backup requires at least 8 GB of storage after formatting, it is recommended to use a USB drive with a capacity of 16 GB or larger. 2.Select the Backup tab and click Get Started for Create Factory Default Backup to open the Recovery Drive window. Recovery - 21 3.Make sure Backup system files to the recovery drive is selected and click Next. 4.Plug in the USB drive and wait for the PC to detect the USB drive then click Next. 22 - Recovery Since the recovery backup requires at least 8 GB of storage after formatting, it is recommended to use a USB drive with a capacity of 16 GB or larger. 5.Everything on the drive will be deleted. Click Create to continue. 6.You will be shown the backup progress on the screen. 7.Follow the process until it completes. 8.After creating the recovery backup, you can choose to delete the recovery this information, you can only use the USB recovery backup to restore your computer, if you lose or erase the USB drive, you cannot restore your computer. information on your computer. If you delete 9.Unplug the USB drive and label it clearly. Important Write a unique, descriptive label on the backup, such as 'Windows Recovery Backup'. Make sure you keep the backup in a safe place that you will remember. Recovery - 23 Backing up your wireless and LAN drivers Back up your wireless and LAN drivers. You can use these backups to install the wireless and LAN drivers if you install another operating system. 1.From Start, select All apps then Acer. Select Acer Recovery Management in the list of Acer apps. 2.Select the Backup tab and click Get started for Backup wireless and LAN drivers. Choose a folder to save your drivers and select OK. Restoring your computer Recovery Management allows you to quickly and easily restore your computer back to its default status. You can choose to keep your files or remove them before reinstalling Windows. Reset this PC and keep my files 1.From Start, select All apps then Acer. Select Acer Recovery Management in the list of Acer apps. 2.Select the Restore tab and click Get started to Choose an option. 24 - Recovery 3.Select Keep my files to refresh your PC and reinstall your operating system without removing your personal files. Click Next to continue. Important If you have apps installed on your PC, they will be removed. 4.Resetting the PC will reinstall Windows, change settings back to their factory defaults and remove all preinstalled apps and programs without removing your personal files. Click Reset to continue. 5.You will be shown the reset progress on the screen. The screen will turn off during the reset process. 6.The screen will turn back on when it is installing Windows. Your PC will restart several times during the reset process. 7.Follow the process until it completes. 8.When your PC has completed the reset process, Windows will have been reset back to its factory default settings without removing your personal files. Reset this PC and remove everything 1.From Start, select All apps then Acer. Select Acer Recovery Management in the list of Acer apps. 2.Select the Restore tab and click Get Started to Choose an option. Recovery - 25 3.Select Remove everything to reset your PC back to its factory default. This process will reinstall your operating system and remove all of your personal files, apps, and settings. 4.Select Just remove my files if you are keeping your computer. This will be quicker, but less secure. Files may still be recovered with a file recovery program. Select Remove files and clean the drive if you are not keeping 26 - Recovery your computer. This process will take longer, but will be more secure. Warning Selecting "Remove files and clean the drive" will remove all of your personal files and accounts, along with pre-existing drivers that may affect your Windows installation. 5. Click Reset to continue. 6.You will be shown the reset progress on the screen. The screen will turn off during the reset process. 7.The screen will turn back on when it is installing Windows. Your PC will restart several times during the reset process. 8.Follow the process until it completes. 9.When your PC has completed the reset process, Windows will use factory default settings. USING A BLUETOOTH CONNECTION Using a Bluetooth connection - 27 Bluetooth is a technology enabling you to transfer data wirelessly over short distances between many different types of devices. Bluetooth-
enabled devices include computers, cell phones, tablets, wireless headsets, and keyboards. To use Bluetooth, you must ensure the following:
1.Bluetooth is enabled on both devices. 2.Your devices are "paired" (or connected). Enabling and disabling Bluetooth The Bluetooth adapter must be enabled on both devices. For your computer, this may be an external switch, a software setting, or a separate Bluetooth dongle plugged into the computers USB port (if no internal Bluetooth adapter is available). Note Please check your devices owners manual to determine how to turn on its Bluetooth adapter. Enable Bluetooth and add a device Every new device must first be "paired" with your computers Bluetooth adapter. This means it must first be authenticated for security purposes. You only need to pair once. After that, simply turning on the Bluetooth adapter of both devices will connect them. Bluetooth on your computer is disabled by default. To enable your computers Bluetooth adapter, do the following:
1.Press the Windows key or select the Windows Start button >
Settings > Devices > Bluetooth, and click the toggle under Bluetooth to enable/disable it. 2.Your computer will automatically start searching for devices, as well as make itself visible to other devices. 28 - Using a Bluetooth connection 3.Select the device you wish to pair from the list of discovered devices, and select Pair. 4.A code displays on your computer, which should match the code displayed on your device. Select Yes. Then, accept the pairing from your device. Note Some devices using older versions of the Bluetooth technology require both devices to enter a PIN. In the case of one of the devices not having any inputs
(as in a headset), the passcode is hardcoded into the device (usually "0000"
or "1234"). Consult your devices user manual for more information. the Bluetooth settings by selecting You can also enter the Notifications icon in the lower right-hand corner of the screen to open the Notifications pane. From here, you can enable or disable Bluetooth or right-click on Bluetooth > Open settings to enter the Bluetooth settings. CONNECTING TO THE INTERNET Connecting to the Internet - 29 This chapter includes general information on types of connections, and getting connected to the internet. For detailed information, please refer to Network connections on page 70. Your computers built-in network features make it easy for you to connect your computer to the internet. First though, in order to connect to the internet from home, youll need to sign up for internet services from an ISP (Internet Service Provider)
-- usually a phone or cable company -- that will have to go to your home or office to set up internet service. The ISP will install a small box, a router or modem, that will allow you to connect to the internet. Connecting to a wireless network Connecting to a wireless LAN A wireless LAN (or WLAN) is a wireless local area network, which can link two or more computers without using wires. Once connected to WLAN, you can access the internet. You can also share files, other devices, and even your internet connection itself. Your computer's wireless connection is turned on by default and Windows will detect and display a list of available networks during setup. Select your network and enter the password if required. Warning Using wireless devices while flying in aircraft may be prohibited. All wireless devices must be switched off before boarding an aircraft and during take-off, as they may be dangerous to the operation of the aircraft, disrupt communications, and even be illegal. You may turn on your computers wireless devices only when informed that it is safe to do so by the cabin crew. Acer notebook computers feature an Airplane mode hotkey that turns the network connection on or off. You can use the network 30 - Connecting to the Internet management options to turn your wireless network on/off or control what is shared over the network. To connect to a wireless network, please follow the steps below. 1.Ensure you have a wireless router/access point and current internet connection through the ISP of your choice. Make a note of the wireless networks name and password (if necessary). If you are trying to connect to a public network (such as at a coffeeshop), make sure you have the wireless networks name. Note Please refer to your ISP or router documentation for details on connecting to the internet. 2.In the icon tray in the lower right-hand corner of the screen, select the Notifications icon to open the Notifications pane. 3.Select All settings. 4.Select Network & internet. 5.Make sure Wi-Fi is On and select Show available networks. Connecting to the Internet - 31 6.You will see a list of available wireless networks. Select the one you wish to use. 32 - Connecting to the Internet 7.Once you select a wireless network, select Connect. 8.If required, enter the networks password. BLUELIGHT SHIELD Bluelight Shield - 33 The Bluelight Shield can be enabled to reduce blue-light emissions from the screen to protect your eyes. To configure the Bluelight Shield, Search for Acer Quick Access in the Start Menu. From here you can toggle Bluelight Shield on or off, and you can choose from four different modes to fit your needs:
No. Item Low 1 Reduction 2 Medium Reduction High Reduction Long Hour Mode Description Reduces blue light emission from the LED backlit screen by 10% to 25% for basic protection. Reduces blue light emission from the LED backlit screen by 26% to 45% to protect your eyes. Reduces blue light emission from the LED backlit screen by 46% to 65% for maximum protection. Professionally tuned to reduce eye strain over an extended period of time. 3 4 Note Specifications vary depending on model or Operating System. Keeping your computer and data safe... In this section you will find:
How to secure your computer Setting passwords What you need to prepare when youre traveling How to get the most out of your battery SECURING YOUR COMPUTER Securing your computer - 35 Your computer is a valuable investment that you need to take care of. Learn how to protect and take care of your computer. Security features include hardware and software locks a security notch and passwords. Using a computer security lock The computer comes with a computer security slot for a security lock. Wrap a computer security lock cable around an immovable object such as a table or handle of a locked drawer. Insert the lock into the notch and turn the key to secure the lock. Some keyless models are also available. Using passwords Passwords protect your computer from unauthorized access. Setting these passwords creates several different levels of protection for your computer and data:
Supervisor Password prevents unauthorized entry into the BIOS utility. Once set, you must enter this password to gain access to the BIOS utility. See Setting passwords on page 42. User Password secures your computer against unauthorized use. Combine the use of this password with password checkpoints on boot-up and resume from Hibernation (if available) for maximum security. Password on Boot secures your computer against unauthorized use. Combine the use of this password with password checkpoints on boot-up and resume from Hibernation (if available) for maximum security. Important Do not forget your Supervisor Password! If you forget your password, please get in touch with your dealer or an authorized service center. 36 - Securing your computer Entering passwords When a password is set, a password prompt appears in the center of the display screen. When the Supervisor Password is set, a prompt appears when you enter the BIOS utility. Type the Supervisor Password and press Enter to access the BIOS utility. If you enter the password incorrectly, a warning message appears. Try again and press Enter. When the User Password is set and the password on boot parameter is enabled, a prompt appears at boot-up. Type the User Password and press Enter to use the computer. If you enter the password incorrectly, a warning message appears. Try again and press Enter. Important You have three chances to enter a password. If you fail to enter the password correctly after three tries, the system halts. Press and hold the power button for four seconds to shut down the computer. Then turn on the computer again, and try again. FINGERPRINT READER Fingerprint Reader - 37 In addition to using an account password or PIN to sign in to Windows apps and services, you can also use the fingerprint reader to sign-in and unlock your Acer notebook. In order to use the fingerprint reader, you must first configure the fingerprint reader to recognize your fingerprint to confirm your identity. How to use the fingerprint reader 1.Select the Start button, then select Settings > Accounts > Sign-in options to set up Windows Hello. 38 - Fingerprint Reader 2.Set a PIN code. 3.In Windows Hello, select Set up to configure the fingerprint reader. 4.In the Windows Hello set up window, select Get started to begin the fingerprint configuration. Fingerprint Reader - 39 5.Enter your PIN to confirm your identity. 40 - Fingerprint Reader 6.When the Windows Hello setup window appears, follow the onscreen directions. Press and hold your finger on the fingerprint sensor and fingerprint configuration is complete. this step until lift. Repeat then the 7.Once the fingerprint configuration is complete, you will be able to sign in or unlock your computer by placing your fingerprint on the fingerprint reader. You may select Add another to add another fingerprint to unlock the computer. Fingerprint Reader - 41 Note If the notebook has multiple accounts, you can set up access separately and automatically switch between accounts. 42 - BIOS utility BIOS UTILITY The BIOS utility is a hardware configuration program built into your computer's BIOS. Your computer is already properly configured and optimized, and you do not normally need to run this utility. However, if you encounter configuration problems, you may need to run it. To activate the BIOS utility, press F2 while the computer logo is being displayed. Boot sequence To set the boot sequence in the BIOS utility, activate the BIOS utility, then select Boot from the categories listed on the left of the screen. Setting passwords To set a password on boot, activate the BIOS utility, then select Security from the categories listed on the left of the screen. Find Set Supervisor Password and enter a password to enable this feature. Once you have entered a password for this feature, you may then enable/disable Password on Boot. Remember to select F10 to properly save and exit the BIOS utility when you are done making changes. POWER MANAGEMENT Power management - 43 This computer has a built-in power management unit that monitors system activity. System activity refers to any activity involving one or more of following devices: keyboard, mouse, hard disk, peripherals connected to the computer, and video memory. If no activity is detected for a period of time, the computer stops some or all of these devices in order to conserve energy. the Saving power Disable Fast startup Your computer uses Fast startup to start quickly, but also uses a small amount of power to check for signals to start. These checks will slowly drain your computers battery. If you prefer to reduce your computers power requirements and environmental impact, turn off Fast startup:
Note If Fast startup is off, your computer will take longer to start from Sleep. Your computer will also not start if it receives an instruction to start over a network (Wake on LAN). 1.Open the desktop. 2.Click Power Options in the Notification area. 3.Select Power & sleep settings. 4.Select Additional power settings. 5.Select Choose what the power buttons do. 44 - Power management 6.Select Change settings that are currently unavailable. 7.Scroll down and disable Turn on fast startup. 8.Select Save changes. BATTERY PACK Battery pack - 45 The computer uses an embedded Lithium battery that gives you long use between charges. Battery characteristics The battery is recharged whenever you connect the computer to the AC adapter. Your computer supports charge-in-use, enabling you to recharge the battery while you continue to operate the computer. However, recharging with the computer turned off significantly reduces charge time. The battery will come in handy when you travel or during a power failure. Charging the battery Plug the AC adapter into the computer, and connect to a mains power outlet. Note You are advised to charge the battery before retiring for the day. Charging the battery overnight before traveling enables you to start the next day with a fully charged battery. Conditioning a new battery pack Before you use a battery pack for the first time, there is a conditioning process that you should follow:
1.Connect the AC adapter and fully charge the battery. 2.Turn on the computer and complete setting up the operating system. 3.Disconnect the AC adapter. 4.Operate the computer using battery power. 5.Reconnect the AC adapter and fully charge the battery again. Follow these steps again until the battery has been charged and discharged three times. 46 - Battery pack Use this conditioning process for all new batteries, or if a battery hasn't been used for a long time. Warning Do not expose battery packs to temperatures below 0 C (32 F) or above 45 C (113 F). Extreme temperatures may adversely affect the battery pack. The battery conditioning process ensures your battery accepts the maximum possible charge. Failure to follow this procedure will prevent you from obtaining the maximum battery charge, and will also shorten the effective lifespan of the battery. In addition, the useful lifespan of the battery is adversely affected by the following usage patterns:
Using the computer on constant AC power. Not discharging and recharging the battery to its extremes, as described above. Frequent use; the more you use the battery, the faster it will reach the end of its effective life. An embedded battery has a life span of more than 1,000 charge/discharge cycles. Optimizing battery life Optimizing battery life helps you get the most out of battery operation, prolonging the charge/recharge cycle and improving recharging efficiency. You are advised to follow the suggestions set out below:
Use AC power whenever possible, reserving battery for mobile use. Remove accessories that are not being used (e.g. a USB disk drive), as they can continue to draw power. Store your PC in a cool, dry place. The recommended temperature is 10 C (50 F) to 30 C (86 F). Higher temperatures cause the battery to self-discharge faster. Excessive recharging decreases the battery life. Look after your AC adapter and battery. Checking the battery level The power meter indicates the current battery level. Rest the cursor over the battery/power icon on the taskbar to see the battery's present charge level. Battery pack - 47 Battery-low warning When using battery power pay attention to the power meter. Important Connect the AC adapter as soon as possible after the battery-low warning appears. Data may be lost if the battery is allowed to become fully depleted and the computer shuts down. When the battery-low warning appears, the recommended course of action depends on your situation:
Situation The AC adapter and a power outlet are available. The AC adapter or a power outlet is unavailable. Recommended Action 1. Plug the AC adapter into the computer, and then connect to the main power supply. 2. Save all necessary files. 3. Resume work. Turn off the computer if you want to recharge the battery rapidly. 1. Save all necessary files. 2. Close all applications. 3. Turn off the computer. 48 - Traveling with your computer TRAVELING WITH YOUR COMPUTER This section gives you tips and hints to consider when moving around or traveling with your computer. Disconnecting from the desktop Follow these steps to disconnect your computer from external accessories:
1.Save any open files. 2.Remove discs from optical drive. 3.Shut down the computer or put it into Sleep or Hibernate mode. 4.Close the display cover. 5.Disconnect the cord from the AC adapter. 6.Disconnect the keyboard, pointing device, printer, external monitor and other external devices. 7.Disconnect the Kensington / Noble lock if you are using one to secure the computer. Moving around When you are just moving within short distances, for example, from your office desk to a meeting room. Preparing the computer Before moving the computer, close and latch the display cover to place it in Sleep mode. You can now safely take the computer anywhere you go within the building. To wake the computer from Sleep mode, open the display and, if necessary, press and release the power button. If you are taking the computer to a client's office or a different building, you may choose to shut down the computer:
Press the Windows key, click Power then select Shut Down Or:
Traveling with your computer - 49 You can put the computer in Sleep mode by pressing the Sleep hotkey or by closing the display. When you are ready to use the computer again, open the display and, if necessary, press and release the power button. Note The computer may enter Hibernation or Deep Sleep mode after being in Sleep mode for a period of time. What to bring to meetings If your meeting is relatively short, you probably do not need to bring anything with you other than your computer. If your meeting will be longer, or if your battery is not fully charged, you may want to bring the AC adapter with you to plug in your computer in the meeting room. If the meeting room does not have an electrical outlet, reduce the drain on the battery by putting the computer in Sleep mode. Press the Sleep hotkey or close the display cover whenever you are not actively using the computer. Taking the computer home When you are moving from your office to your home or vice versa. Preparing the computer After disconnecting the computer from your desktop, follow these steps to prepare the computer for the trip home:
Check that you have removed all media and compact discs from the drive(s). Failure to remove the media can damage the drive head. Pack the computer in a protective case that can prevent the computer from sliding around and cushion it if it should fall. Warning Avoid packing items next to the top cover of the computer. Pressure against the top cover can damage the screen. 50 - Traveling with your computer What to take with you Unless you have some items at home, take the following items with you:
AC adapter and power cord. The printed Setup Guide. Special considerations Follow these guidelines to protect your computer while traveling to and from work:
Minimize the effects of temperature changes by keeping the computer with you. If you need to stop for an extended period of time and cannot carry the computer with you, leave the computer in the trunk of the car to avoid exposing the computer to excessive heat. Changes in temperature and humidity can cause condensation. Allow the computer to return to room temperature, and inspect the screen for condensation before turning on the computer. If the temperature change is greater than 10 C (18 F), allow the computer to come to room temperature slowly. If possible, leave the computer for 30 minutes in an environment with a temperature between outside and room temperature. Setting up a home office If you frequently work on your computer at home, you may want to purchase a second AC adapter for use at home. With a second AC adapter, you can avoid carrying the extra weight to and from home. If you use your computer at home for significant periods of time, you might also want to add an external keyboard, monitor or mouse. Traveling with the computer Traveling with your computer - 51 Important Check with your airline for any special requirements for travelling with Lithium batteries. When you are moving within a larger distance, for instance, from your office building to a client's office building or traveling locally. Preparing the computer Prepare the computer as if you were taking it home. Make sure that the battery in the computer is charged. Airport security may require you to turn on your computer when carrying it into the gate area. What to take with you Take the following items with you:
AC adapter Additional printer driver files if you plan to use another printer Special considerations In addition to the guidelines for taking the computer home, follow these guidelines to protect your computer while traveling:
Always take the computer as carry-on luggage. If possible, have the computer inspected by hand. Airport security X-
ray machines are safe, but do not put the computer through a metal detector. Traveling internationally Important Check with your airline for any special requirements for travelling with Lithium batteries. When you are moving from country to country. 52 - Traveling with your computer Preparing the computer Prepare the computer as you would normally prepare it for traveling. What to bring with you Bring the following items with you:
AC adapter. Power cords that are appropriate for your destination(s). Additional printer driver files if you plan to use another printer. Proof of purchase, in case you need to show it to customs officials. International Travelers Warranty passport. Special considerations Follow the same special considerations as when traveling with the computer. In addition, these tips are useful when traveling internationally:
When traveling in another country, check that the local AC voltage and the AC adapter power cord specifications are compatible. If not, purchase a power cord that is compatible with the local AC voltage. Do not use converter kits sold for appliances to power the computer. If you are using the modem, check if the modem and connector are compatible with the telecommunications system of the country you are traveling in. Ports and connectors... In this section you will find:
Information on the ports and connectors fitted to your computer 54 - Universal Serial Bus (USB) UNIVERSAL SERIAL BUS (USB) The USB port is a high-speed port which allows you to connect USB peripherals, such as a mouse, an external keyboard, additional storage (external hard disks), or any other compatible device. Note Two USB standards are currently available on Acer computers: USB 2.0
(High-speed USB) and USB 3.0 (SuperSpeed USB). USB 2.0 ports on Acer computers have a black tongue in the port, while USB 3.0 ports have a blue tongue. For best performance, USB 3.0 devices should always be plugged into USB 3.0 ports. Consult your devices documentation to see which standard it supports. You can also charge devices such as tablets, smartphones, or other devices through a USB port. Some USB 3.0 ports support charging devices when the computer is in Hibernate or turned off. Additionally, you can use a USB hub to connect multiple devices to a single USB port. Important When removing a USB storage device, you should right-click on the USB icon in the Windows task bar and select "Eject <device>" to tell the operating system to stop using the device before removing it. Failure to do this may result in data loss or damage to your peripheral. USB TYPE-C PORT USB Type-C port - 55 A USB Type-C port is a connector that allows you to easily connect USB Type-C peripherals, such as additional storage (e.g. an external drive), or any other compatible device. The Type-C port is reversable; connectors may be inserted with either side up. Note On Acer computers USB Type-C ports support up to USB 3.1 (SuperSpeed USB, 5 Gbps). Other USB or Thunderbolt devices with a USB Type-C connector are supported, but transfer speed may be reduced and certain functions will be disabled (such as Thunderbolt video support). Important When removing a USB storage device, you should right-click on the USB icon in the Windows task bar and select "Eject <device>" to tell the operating system to stop using the device before removing it. Failure to do this may result in data loss or damage to your peripheral. 56 - SD card reader SD CARD READER SD (Secure Digital) cards are used in a wide selection of digital cameras, tablets, media players and cellular phones. Inserting an SD card 1.Align the card so that the connector points towards the port, with the connectors facing down. 2.Carefully slide the card into the port. If you find you need to use any force to insert the card, try reorientating the card slightly. 3.Push the card until it clicks into place. A few millimetres of the card will extend from beyond the slot. If the card contains some files, the Windows AutoPlay window may appear (this depends on the contents of the card) and ask you if you wish to use a program to access the contents of the card. Important When removing an SD card, you should right-click on the USB icon in the Windows task bar and select "Eject <card name>" to tell the operating system to stop using the device before removing it. Failure to do this may result in data loss or damage to your peripheral. SD, SDHC and SDXC cards Different types of SD cards cover different capacities, while using the same overall design. SD cards contain up to 4 GB; SDHC cards contain up to 32 GB; and SDXC cards can contain up to 2048 GB
(2 TB). Your computer provides an SDHC or SDXC compatible card reader. Note SDXC memory cards can only be used in an SDXC-compatible reader; SD and SDHC cards can be used in either type. VIDEO AND AUDIO CONNECTORS Video and audio connectors - 57 Add an external monitor to your computer via a video port. The type of port available depends on your computers configuration. Connecting a monitor 1.Check that the computer is powered off and the monitor power switch is turned off. 2. Attach the video cable to the monitor port on the computer. 3.Connect the monitor power cable and plug it into a properly grounded wall outlet. 4.Follow any setup instructions in the monitor's user's guide. 5.Turn on power to the monitor, then the computer. 6.The correct resolution and refresh rate should be detected automatically. If necessary, change the display settings used by the computer. Note To access the display controls, right-click anywhere on the desktop and select Display settings. Headphones and microphone One or more 3.5 mm jacks on your computer allow you to connect audio devices. Use the headphone port to plug in stereo headphones or powered speakers; connecting an audio device to the headphone port disables the built-in speakers. Use the microphone port to connect an external microphone;
connecting a microphone disables the built-in microphone. Note Some computers have a single "combo" port that allows you to use single-pin headsets with a built-in microphone. These headsets are most commonly used with smartphones. 58 - HDMI HDMI HDMI (High-Definition Multimedia Interface) is a high-quality, digital audio/video interface. HDMI allows you to connect any compatible digital audio/video source, such as your computer, a set-top box, DVD player, and audio/video receiver to any compatible digital audio and/or video monitor, such as a digital television (DTV) with a single cable. The single cable keeps everything neat and tidy while ensuring easy connection and the best audio and visual quality. Got a question?
In this section you will find:
Frequently asked questions Tips for using Windows 10 Troubleshooting information How to protect yourself while online Where to find Acer service center contact information 60 - Frequently asked questions FREQUENTLY ASKED QUESTIONS The following is a list of possible situations that may arise during the use of your computer. Easy solutions are provided for each one. I turned on the power, but the computer does not start or boot up. Check if power is being supplied to the computer (if your computer has a power indicator, it will be off); if there is no power, check the following:
If you are using on the battery, it may be low and unable to power the computer. Connect the AC adapter to recharge the battery pack. You may need to wait a few minutes before trying to turn your computer on again. Make sure that the AC adapter is properly plugged into the computer and to the power outlet. If power is being supplied to the computer, check the following:
Do you have a USB storage device (USB drive, CD drive or smartphone) plugged into your computer? Unplug it and press Ctrl
+ Alt + Del to restart the system. Nothing appears on the screen. The computers power management system automatically blanks the screen to save power. Press any key to turn the display back on. If pressing a key does not turn the display back on, three things might be the cause:
The brightness level might be too low. Use the Brightness up hotkey to adjust the brightness level. The display device might be set to an external monitor. Press the display toggle hotkey to toggle the display back to the computer. The computer may be in Sleep or Hibernate mode (if there is a power LED, it will flash). Press and release the power button to resume. No audio is heard from the computer. Check the following:
The volume may be muted. Look at the volume control (speaker) Frequently asked questions - 61 icon in the taskbar. If it is crossed-out, click the icon and deselect the Mute all option. The volume level may be too low. Check the volume from the volume control (speaker) icon in the taskbar. You can also use the volume control hotkeys to adjust the volume. If headphones, earphones or external speakers are connected to the headphone jack on the computer, the internal speakers automatically turn off. The keyboard does not respond. Try attaching an external keyboard to a USB port on the computer. If it works, contact your dealer or an authorized service center as the internal keyboard cable may be loose. The printer does not work. Make sure that the printer is connected to a power outlet and that it is turned on. Make sure that the printer cable is connected securely to a USB port and the corresponding port on the printer. I want to restore my computer to its original settings. Note If your system is the multilingual version, the operating system and language you choose when you first turn on the system will be the only option for future recovery operations. This recovery process helps you restore the C: drive with the original software content that is installed when you purchased your computer. Warning Your C: drive will be reformatted and all data will be erased. It is important to back up all data files before using this option. Before performing a restore operation, please check the BIOS settings. 1.Check to see if Acer disk-to-disk recovery is enabled or not. 2.If there is a D2D Recovery setting in Main, make sure it is Enabled. 3.Exit the BIOS utility and save changes. The system will reboot. 62 - Frequently asked questions Note To access the BIOS utility, press F2 when you see the Acer logo during boot up. For more information, see Restoring your computer on page 23. Requesting service International Travelers Warranty (ITW) Your computer is backed by an International Travelers Warranty
(ITW) that gives you security and peace of mind when traveling. An ITW passport came with your computer and contains all you need to know about the ITW program. A list of available, authorized service centers is in this handy booklet. Read this passport thoroughly. Always have your ITW passport on hand, especially when you travel, to receive the benefits from our support centers. Attach your proof-of-
purchase to the ITW passport. If the country you are traveling in does not have an Acer-authorized ITW service site, you can still get in contact with our offices worldwide. Please visit www.acer.com. Before you call Please have the following information available when you call Acer for online service, and please be at your computer when you call. With your support, we can reduce the amount of time a call takes and help solve your problems efficiently. If there are error messages or beeps reported by your computer, write them down as they appear on the screen (or the number and sequence in the case of beeps). You are required to provide the following information:
Name:
Address:
Telephone number:
Machine and model type:
Serial number:
Date of purchase:
Frequently ask Frequently asked questions - 63 Tips and hints for using Windows 10 We know this is a new operating system that will take some getting used to, so we've created a few pointers to help you get started. How do I get to Start?
Tap the Start button on the lower left-hand corner of the screen. Wheres the Start button?
The Start button will appear in the desktop taskbar. Tapping it will open Start where you can launch apps. How do I see all of my apps?
Tap the Windows Start button and tap All apps to show a list of installed apps on the computer. How do I turn off my computer?
Tap the Windows Start button and tap the power icon > Shut down. Can I turn off notifications?
You can turn off notifications so that you can leave your computer running, but not be disturbed by notifications. Tap the Windows Start button and tap Settings > System >
Notifications & actions. From here you can enable/disable notifications for all of your apps or choose which apps to enable/
disable. How do I unlock my computer?
Swipe the lock screen upwards and tap a user account icon to unlock the computer. If your account has a password set, you will need to enter the password to continue. Can I personalize the Lock screen?
You can personalize the lock screen with a different image, to run a slideshow of images, or to show you quick status and notifications to suit your personal needs. 64 - Frequently asked questions To change the background, tap the Windows Start button and tap Settings > Personalization. From here you can:
Select a background image for the lock screen Turn the Slide show on or off Select lock screen apps. How do I set up the lock screen slideshow?
1.Tap the Windows Start button and select Settings >
Personalization. 2.Under Lock screen, select Slideshow. 3.Tap Add a folder and open the folder you wish to use (your Pictures folder will open by default). Tap Choose this folder to add the folder to the lock screen slideshow. 4.Select a folder and tap Remove to remove the folder from the lock screen slideshow. 5.Change the other settings to suit your needs. How do I move tiles?
Tap on a tile and drag it to the place on Start that you want it to appear. Other tiles will be moved to accommodate the tile in its new location. Can I arrange tiles in groups?
Yes, you can. Tap and hold a tile until you see the screen dim. Drag the tile to arrange Start to your liking. Can I make tiles bigger or smaller?
Yes, you can. Tap and hold a tile until you see the screen dim. Tap ... and select a size from the menu that appears. Can I change the screen resolution?
Yes, you can. Tap Search and use the onscreen keyboard to type
'Resolution' in the text box to display the results; tap Chang the screen resolution. Alternatively, you can also tap and hold anywhere on the screen and tap Display settings > Display > Advanced display settings. How do I set the alarm?
Frequently asked questions - 65 Your computer can act as an alarm clock. Type Alarms to search for the Alarms & Clock app. 1.Select an alarm from the list, or select the + in the lower-right corner to create a new alarm. 2.Enter the Alarm name. 3.Set the time by choosing the hour and minute. 4.Select AM or PM. 5.Choose which days the alarm should go off. 6.Select the sound notification. 7.Select the snooze time. 8.Tap the Save icon in the bottom right-hand corner to save the alarm. 9.Select On or Off to activate or deactivate the alarm. Hour Minutes Save Delete Note The alarm will only sound if your computer is awake at the set time. Where are my apps?
Tap Search and type the name of the app you would like to open using the pop-up keyboard. To view the complete list of apps, tap the Windows Start button and tap All apps. 66 - Frequently asked questions How do I make an app appear on Start?
If you're in All apps and you want to make an app appear on Start, tap and hold the app until you see the screen dim. When you release the app, tap Pin to Start from the menu that appears. How do I remove a tile from Start?
Tap and hold a tile until you see the screen dim. When you release the tile, tap the Unpin icon to remove the tile from Start. How do I make an app appear on my taskbar?
If you're in All apps and you want to make an app appear on the taskbar, tap and hold the app until you see the screen dim. When you release the app, tap More > Pin to taskbar from the menu that appears. How do I install apps?
You can download Windows Store apps from Store. You will need to have a Microsoft ID to purchase and download apps from Store. I can't find apps like Notepad and Paint! Where are they?
Tap Search and type the name of the app you would like to open using the pop-up keyboard. Alternatively, open All apps and scroll to Windows Accessories to see the list of legacy programs. What is a Microsoft ID (account)?
A Microsoft account is an email address and password that you use to sign in to Windows. You can use any email address, but it is best if you choose the one you already use to communicate with friends and sign in to your favorite websites. When you sign in to your PC with a Microsoft account, you'll connect your PC to the people, files, and devices you care about. Do I need one?
You do not need a Microsoft ID to use Windows 10, but it makes life easier because you can sync data across different machines you sign in to using a Microsoft ID. Frequently asked questions - 67 How do I get one?
If you've already installed Windows 10 and didn't sign in with a Microsoft account or you don't have a Microsoft account and want to get one, tap the Windows Start button > Settings > Accounts > Sign in with a Microsoft account, and follow the onscreen instructions. How do I check for Windows updates?
Tap the Windows Start button > Settings > Update & security >
Windows Update. Tap Advanced options to configure the settings. Where can I get more information?
For more information please visit the following pages:
Windows 10 information: go.acer.com/windows-tutorial Support FAQs: support.acer.com 68 - Internet and online security INTERNET AND ONLINE SECURITY First steps on the net Protecting your computer It is vital to protect your computer from viruses and attacks over the internet (see Internet security software on page 72). A comprehensive internet security program is offered when you first start your computer. You should activate this protection as soon as possible, certainly before you connect to the internet. Choose an Internet Service Provider Using the internet has become a natural part of daily computing. Just a few simple steps can connect you to a vast collection of knowledge and communication tools. To accomplish these steps you should first select an Internet Service Provider (ISP), which supplies the connection between your computer and the internet. You should research the ISPs available in your region, not forgetting to talk to friends and family about their experiences or to check reviews and consumer reports. The ISP you select will provide instructions on how to connect to the internet (you may need additional software or a special box that connects to your phone line). Connection types Depending on your computer model, your location and your communication needs, you have several ways to connect to the internet. Dial-up Some computers include a telephone dial-up (modem) connector. This allows you to connect to the internet using your telephone line. With a dial-up connection, you cannot use the modem and the telephone simultaneously on a single phone line. This type of connection is recommended only if you have limited use of the internet as the connection speed is low and connection time is typically charged per hour. Internet and online security - 69 DSL (e.g. ADSL) DSL (Digital Subscriber Line) is an always-on connection that runs over the phone line. As DSL and phone do not use the same frequencies, you can use your telephone at the same time you are connected to the internet (this requires a micro-filter on each telephone socket to avoid interference). To be eligible for DSL, you must be located near an DSL-equipped phone exchange (service is sometimes unavailable in rural areas). Connection speeds vary depending on your location, but DSL generally provides very fast and reliable internet connection. As the connection is always-on, it is generally charged at fixed monthly rates. Note A DSL connection requires an appropriate modem. A modem is usually provided by the ISP when you register. Many of these modems include an router that provides network and Wi-Fi access. Cable A cable connection provides fast and always-on internet service via a cable television line. This service is generally available in large cities. You can use your telephone and watch cable TV at the same time you are connected to the internet. Cellular A cellular connection allows you to use cellular networks (such as those used by a mobile phone) to connect to the internet while away from home. The socket for a SIM card may be built in to your computer, or may require an external device, such as a USB modem or even an appropriately equipped mobile phone. Note If your computer includes a SIM card slot, you require a compatible SIM card and a contract with a cellular provider. Before using the cellular features, check with your service provider to see if any additional charges will be incurred, especially roaming charges. 70 - Internet and online security Network connections A LAN (Local Area Network) is a group of computers (for example, within an office building or home) that share a common communications line and resources. When you set up a network, you can share files, peripheral devices (such as a printer) and an internet connection. You can set up a LAN using wired technologies (such as Ethernet) or wireless technologies (such as Wi-Fi or Bluetooth). Wireless networks A wireless LAN or WLAN is a wireless local area network, which may link two or more computers without using wires. Setting up a wireless network is easy and allows you to share files, peripheral devices and an internet connection. What are benefits of a wireless network?
Mobility Wireless LAN systems allow you and other users of your home network to share access to files and devices connected to the network, for example a printer or scanner. Also you can share an internet connection with other computers in your home. Installation speed and simplicity Installing a wireless LAN system can be fast and easy and eliminates the need to pull cables through walls and ceilings. Components of a wireless LAN To set up your Wireless network at home you need to have the following:
Access point (router) Access points (routers) are two-way transceivers that broadcast data into the surrounding environment. Access points act as a mediator between wired and wireless network. Most routers have a built-in DSL modem that will allow you access to a high speed DSL internet connection. The ISP (Internet Service Provider) you have chosen normally supplies a modem/router with the subscription to their services. Read carefully the documentation supplied with your Access Internet and online security - 71 point/router for detailed setup instructions. Network cable (RJ45) A network cable (also called RJ45 cable) is used to connect the host computer to the access point (see illustration below); this type of cable may also be used to connect peripheral devices to the access point. Wireless adapter Most computers feature a wireless module and Wi-Fi button that turns the network connection on or off. You may also turn your wireless network on or off, or control what is shared over the network with the network management options. Search HomeGroup and then click on HomeGroup. Warning Using wireless devices while flying in aircraft may be prohibited. Switch off all devices before boarding an aircraft; they may be dangerous to the operation of the aircraft, disrupt communications, and even be illegal. After take off, ask the cabin crew if you may enable Wi-Fi. Surf the Net!
To surf the internet, you need a program called an internet browser. Microsoft Edge provides an easy and secure web browsing experience. As soon as you have your internet access installed and you are connected, from the Start Menu, click the Microsoft Edge tile or the icon located in the taskbar and take your internet experience to a new level!
Acer website To get you started why not visit our website, www.acer.com. Acer is dedicated to provide you with on-going personalized support. Check out our Support section to get help tailored to your needs. www.acer.com is your portal to a world of online activities and services: visit us regularly for the latest information and downloads!
72 - Internet and online security Internet security software To help you stay ahead of cybercriminals, Acer has partnered with Norton to offer you security for all your devices. Select Acer computers include protection by Norton Security Norton Security is pre-installed on select Acer computers, protecting your identity and financial data from viruses, spyware, malware and other online threats. Learn more about how to stay safe online and how to stay protected after your introductory subscription ends. Note Specifications vary depending on model or Operating System. Staying ahead of cybercriminals Stay ahead of hackers and cybercriminals by understanding the tactics they use to access your private data. Ensure your software is up to date Cybercriminals rely heavily upon software or platform vulnerabilities, as they are the easiest way to sneak malware into a user's device unnoticed, sometimes with little action on the user's part. Immediately after a software manufacturer announces an update, hackers are ready with malware that can breach holes in the software that would have been patched if the update was installed. How to stay safe: Perform any and all software updates as soon as they are available. Keep a lookout for fake or phishing emails Beware of emails that appear to be from a friend or business colleague that you know but seem a little odd. Maybe they didn't capitalize your name or there are misspellings. The email might be from cybercriminals who are trying to fool you into sending them your credit card number, social security number, or logging into a fake bank website that looks like yours but really isn't. How to stay safe: Use a strong antispam filter. If an email looks strange, don't click on anything and delete it immediately. Instead manually launch a browser and type in your bank's website address and log-in yourself. Internet and online security - 73 Don't be fooled if someone calls your phone A tech support scam is a form of online fraud where people call you on the phone saying they're Technical Support from a trusted company like Norton or Microsoft and that you have a virus. The main motive behind these scams is to extort money from the victim. Cybercriminals can also install malware such as keylogging software or backdoor Trojans in order to gain access to personal information. How to stay safe: Don't fall for phone calls that tell you your software or computer isn't working. Never give your personal information like social security or credit card numbers to someone that you don't know over the phone. Common threats cybercriminals use Now you know a few very common ways cybercriminals try to sneak onto your device or trick you into providing private information to them directly. Here are a few of the types of malware they like to deploy once they've got into a device and what to do if you're ever infected. Ransomware A form of malware that will encrypt personal data files on your computer and attached devices. Encryption converts files into another format, that can only be opened with a specific decryption key. Once the ransomware installs itself, it will display a warning message that the computer is now locked. The user is given a specific amount of money to pay as a "fine" and a timeframe in which to pay. Even if paid, the criminal might choose to not unencrypt the files anyway!
What to do if you're infected: Avoid getting infected in the first place by staying protected with internet security software like Norton Security. Also, perform regular backups of all your data either online or to a separate external hard drive that is only attached to your computer while performing the backup. Ransomware has been known to lock access to external hard drives attached to the computer. If you are infected with ransomware, think twice before you pay the ransom. There is no guarantee the cybercriminal will unlock your files and you'll be funding them to prey upon another innocent victim. 74 - Internet and online security Botnets A botnet is a string of infected, connected computers coordinated together to perform a task. Botnets gain access to your machine through some piece of malicious coding. Once the software is downloaded, the botnet will now contact its master computer and let it know that everything is ready to go. Now your computer, phone, tablet, or IoT device is entirely under the control of the person who created the botnet. Most people who are infected with botnets aren't even aware that their computer's security has become compromised!
What to do if you're infected: If you're infected you probably don't realize it as bots are notoriously quiet. Your Internet Service Provider might send you a notification alerting you that they found a threat on your network and that you need to remove the bot. If you have a bot, use internet security software like Norton Security to scan all of your devices. Viruses/Malware
"Virus" is the commonplace word for all malicious software programs for years now; however, a virus is just one type of malicious threat. A virus is classified as a self-replicating piece of malicious code that travels by inserting itself into files or programs. What to do if you're infected: Take steps to avoid infection by staying protected with internet security software like Norton Security. If you subscribed to Norton Security and think you may have a virus, contact Norton's on-call technicians to help eliminate the virus. Take special precautions when using public Wi-Fi Public Wi-Fi is available just about everywhere, from the local coffee shop to the hotels and airports you visit while traveling. While public Wi-Fi has made our lives a little easier, it also poses security risks to the personal information available on our laptops and smartphones. A virtual private network (VPN) gives you online privacy and anonymity by creating a private network from a public internet connection. VPNs mask your internet protocol (IP) address so your online actions are virtually untraceable as well as secure. One of the biggest security risks on public Wi-Fi are man-in-the-middle attacks (MITM). These attacks are akin to eavesdropping. Data is sent from point A
(computer) to point B (server/website), and an attacker can get in-
Internet and online security - 75 between these transmissions. They then set up tools programmed to
"listen in" on transmissions, intercept data that is specifically targeted as valuable, and capture the data, such as your login credentials and passwords. Use a virtual private network (VPN) to ensure your privacy and anonymity are protected when you use public Wi-Fi. VPN services can encrypt all the data that you send and receive while using a public Wi-Fi hotspot, securing your information from hackers and other users of the same connection. For more tips on how to stay safe Good security habits can reduce your exposure to online crime. By adopting a few basic behaviors, you can make big strides in reducing cybercrime risk:
Protect your accounts with strong, unique passwords that use a combination of at least 10 uppercase and lowercase letters, symbols and numbers. Don't click on random links or open unsolicited messages and attachments-particularly from people you don't know. Don't access any personal information or social media accounts over unprotected Wi-Fi networks. Use security software on your devices to help protect yourself from the latest threats. Protect your computer with Windows security tools Windows provides a variety of protection applications. Windows Updates If you have an active internet connection, Windows can check for important updates for your computer and install them automatically. These updates include security patches and program updates that can improve your computing experience and help protect your computer against new viruses and attacks. How do I know when my computer is at risk?
If the Action Center reports an alert, or if your computer behaves erratically, crashes unexpectedly or if some of your programs do not work correctly, your computer may be infected by malicious software. 76 - Internet and online security However, do not blame every computer problem on a virus! If you suspect your computer is infected, the first thing to do is update, if you have not already done so, and run your antivirus and anti-spyware software.
various | User manual (statement) | Users Manual | 1.02 MiB |
Regulatory Information and Safety Guide 2 -
2017. All Rights Reserved. Regulatory Information and Safety Guide This revision: 02/2017 TABLE OF CONTENTS Table of contents - 3 Important safety information for children Tips and information for comfortable use 6 Finding your comfort zone .......................... 6 Taking care of your vision........................... 7 Developing good work habits...................... 8 Protecting your hearing............................... 8 4 Basic care and tips for using your computer 9 Turning your computer on and off............... 9 Taking care of your computer ..................... 9 General ..................................................... 10 Safety instructions ................................. 11 Product servicing ...................................... 11 Cleaning and servicing.............................. 11 Battery and adapter information ............ 12 Accessing the power................................. 12 Disconnecting the power source............... 12 Using electrical power............................... 12 Guidelines for safe battery usage ............. 14 Warnings and regulatory information 16 Optical drives......................................... 16 Telephone line safety............................. 17 Emergency calls........................................ 17 Medical devices ..................................... 17 Vehicles ................................................. 18 Potentially explosive environments........ 18 Disposal instructions.............................. 19 ENERGY STAR ..................................... 19 Wireless adapter regulatory information 20 Radio frequency interference.................... 20 Use on aircraft........................................... 21 The wireless adapter and your health....... 21 USA FCC and FAA............................... 21 FCC radio frequency interference requirements............................................. 22 Canada Industry Canada (IC) .............. 24 European Union ........................................ 24 Compliant with Russian regulatory certification................................................ 30 4 - Important safety information for children IMPORTANT SAFETY INFORMATION FOR CHILDREN CAUTION - ELECTRICALLY OPERATED PRODUCT. THIS IS NOT A TOY. TO AVOID RISK OF ELECTRIC SHOCK OR FIRE IT SHOULD NOT BE USED WITHOUT ADULT SUPERVISION OR PLACED WHERE SMALL CHILDREN CAN REACH IT. CAUTION -
ELECTRICALLY OPERATED PRODUCT. Not recommended for children under 3 years of age. As with all electrical products, precautions should be observed during handling and use of electrical products to reduce the risk of electric shock.
"CAUTION for film bag - Keep away from small children; the thin film may cling to nose and mouth and prevent breathing."
As with the power supply (adapter) should not be handled by the children, precautions should be observed during handling and use to prevent electric shock and high temperature. As with all electrical products, precautions should be observed during handling and use to prevent electric shock. The power supply
(adapter) should not be handled by the children.
"As with all electrical products, precautions should be observed during handling and use to prevent electric shock. The child should be very careful while handling the power supply (adapter), in particular plugging the power supply into the receptacle (power outlet). The product should not be placed on the bare skin (lap) of the child for long periods. The laptop should be placed on another surface, like desk tabletop, if intending to use it for more than a few minutes."
The product, including power supply and battery pack, as applicable should not be left in the rain or subjected to exposure to water. If cleaning is necessary do not immerse in water; wipe clean with damp cloth. The product, including power supply and battery pack, as applicable should not be dropped, crushed (stepped on) or otherwise abused. The children should be careful with the interconnect cable (wiring) between the power supply (adapter) and laptop, in particular as a potential trip hazard. Important safety information for children - 5 An adult should inspect the product, including power supply and battery pack, as applicable periodically for damage, and replace if necessary. Similarly, if a child notices damaged/broken parts, this should be reported to the teacher immediately so that the damaged parts can be replaced. The children should be careful with the interconnect cable (wiring) between the power supply (adapter) and laptop, in particular as a potential trip hazard. 6 - Tips and information for comfortable use TIPS AND INFORMATION FOR COMFORTABLE USE Important Some of the information in this guide may not apply to your computer. Computer users may complain of eyestrain and headaches after prolonged use. Users are also at risk of physical injury after long hours of working in front of a computer. Long work periods, bad posture, poor work habits, stress, inadequate working conditions, personal health and other factors greatly increase the risk of physical injury. Incorrect computer usage may lead to carpal tunnel syndrome, tendonitis, tenosynovitis or other musculoskeletal disorders. The following symptoms may appear in the hands, wrists, arms, shoulders, neck or back:
Numbness, or a burning or tingling sensation. Aching, soreness or tenderness. Pain, swelling or throbbing. Stiffness or tightness. Coldness or weakness. If you have these symptoms, or any other recurring or persistent discomfort and/or pain related to computer use, consult a physician immediately and inform your company's health and safety department. The following section provides tips for more comfortable computer use. Finding your comfort zone Find your comfort zone by adjusting the viewing angle of the monitor, using a footrest, or raising your sitting height to achieve maximum comfort. Observe the following tips:
Refrain from staying too long in one fixed posture. Tips and information for comfortable use - 7 Avoid slouching forward and/or leaning backward. Stand up and walk around regularly to remove the strain on your leg muscles. Take short rests to relax your neck and shoulders. Avoid tensing your muscles or shrugging your shoulders. Install the external display, keyboard and mouse properly and within comfortable reach. If you view your monitor more than your documents, place the display at the center of your desk to minimize neck strain. Taking care of your vision Long viewing hours, wearing incorrect glasses or contact lenses, glare, excessive room lighting, poorly focused screens, very small typefaces and low-contrast displays could stress your eyes. The following sections provide suggestions on how to reduce eyestrain. Eyes Rest your eyes frequently. Give your eyes regular breaks by looking away from the monitor and focusing on a distant point. Blink frequently to keep your eyes from drying out. Display Keep your display clean. Keep your head at a higher level than the top edge of the display so your eyes point downward when looking at the middle of the display. Adjust the display brightness and/or contrast to a comfortable level for enhanced text readability and graphics clarity. Eliminate glare and reflections by:
placing your display in such a way that the side faces the window or any light source, minimizing room light by using drapes, shades or blinds, using a task light, changing the display's viewing angle, using a glare-reduction filter, 8 - Tips and information for comfortable use using a display visor, such as a piece of cardboard extended from the display's top front edge. Avoid adjusting your display to an awkward viewing angle. Avoid looking at bright light sources for extended periods of time. Developing good work habits The following work habits make computer use more relaxing and productive:
Take short breaks regularly and often. Perform some stretching exercises. Breathe fresh air as often as possible. Exercise regularly and maintain a healthy body. Warning We do not recommend using the computer on a couch or bed. If this is unavoidable, work for only short periods, take breaks regularly, and do some stretching exercises. Protecting your hearing Warning Permanent hearing if earphones or headphones are used at high volume for prolonged periods of time. loss may occur To protect your hearing, follow these instructions. Increase the volume gradually until you can hear clearly and comfortably. Do not increase the volume level after your ears have adjusted. Do not listen to music at high volumes for extended periods. Do not increase the volume to block out noisy surroundings. Decrease the volume if you can't hear people speaking near you. BASIC CARE AND TIPS FOR USING YOUR COMPUTER Basic care and tips for using your computer - 9 Read these instructions carefully. Keep this document for future reference. Follow all warnings and instructions marked on the product. Turning your computer on and off To turn on the computer, simply press and release the power button. Please refer to the setup poster for the location of the power button. To turn the power off, do any of the following:
Use the Windows shutdown command: Press the Windows key +
<C>, click Settings > Power then click Shut Down. If you need to power down the computer for a short while, but dont want to completely shut it down, you can put it into Hibernate by:
Pressing the power button. You can also put the computer in sleep mode by pressing the sleep hotkey <Fn> + <F4>. Note If you cannot power off the computer normally, press and hold the power button for more than four seconds to shut down the computer. If you turn off the computer and want to turn it on again, wait at least two seconds before powering up. Taking care of your computer Your computer will serve you well if you take care of it. Do not expose the computer to direct sunlight. Do not place it near sources of heat, such as a radiator. Do not expose the computer to temperatures below 0 C (32 F) or above 50 C (122 F). Do not subject the computer to magnetic fields. Do not expose the computer to rain or moisture. Do not spill water or any liquid on the computer. 10 - Basic care and tips for using your computer Do not subject the computer to heavy shock or vibration. Do not expose the computer to dust or dirt. Never place objects on top of the computer. Do not slam the computer display when you close it. Never place the computer on uneven surfaces. General Do not use this product near water. Do not place this product on an unstable cart, stand or table. If the product falls, it could be seriously damaged. Slots and openings are provided for ventilation to ensure reliable operation of the product and to protect it from overheating. These openings must not be blocked or covered. The openings should never be blocked by placing the product on a bed, sofa, rug or other similar surface. This product should never be placed near or over a radiator or heat register, or in a built-in installation unless proper ventilation is provided. Never push objects of any kind into this product through cabinet slots as they may touch dangerous voltage points or short-out parts that could result in a fire or electric shock. Never spill liquid of any kind onto or into the product. To avoid damage of internal components and to prevent battery leakage, do not place the product on a vibrating surface. Never use it under sporting, exercising, or any vibrating environment which will probably cause a short-circuit or damage rotor devices, HDD, optical drive, and even exposure risk from the lithium battery pack. The bottom surface, areas around ventilation openings and AC adapter may get hot. To avoid injury, ensure they do not come in contact with your skin or body. Your device and its enhancements may contain small parts. Keep them out of the reach of small children. The surface temperature of the base will rise during normal operation, particularly when plugged in to AC power. Allowing sustained contact with exposed skin can cause discomfort or burns. Basic care and tips for using your computer - 11 Safety instructions Product servicing Do not attempt to service this product yourself, as opening or removing covers may expose you to dangerous voltage points or other risks. Refer all servicing to qualified service personnel. Unplug this product from the wall outlet and refer servicing to qualified service personnel when:
The power cord or plug is damaged, cut or frayed. Liquid was spilled into the product. The product was exposed to rain or water. The product has been dropped or the case has been damaged. The product exhibits a distinct change in performance, indicating a need for service. The product does not operate normally after following the operating instructions. The product exhibits a distinct change in performance, indicating a need for service. The product does not operate normally after following the operating instructions. Note Adjust only those controls that are covered by the operating instructions, since improper adjustment of other controls may result in damage and will often require extensive work by a qualified technician to restore the product to normal condition. Cleaning and servicing When cleaning the computer, follow these steps:
1.Turn off the computer and remove the battery pack. 2.Disconnect the AC adapter. 3.Use a soft, moist cloth. Do not use liquid or aerosol cleaners. 12 - Basic care and tips for using your computer Battery and adapter information Accessing the power Be sure that the power outlet you plug into is easily accessible and located as close to the equipment operator as possible. When you need to disconnect power to the equipment, be sure to unplug from the electrical outlet. Disconnecting the power source Observe the following guidelines when connecting and disconnecting power to the power supply unit:
Install the power supply unit before connecting to the AC power outlet. Unplug before removing the power supply unit from the computer. If the system has multiple sources of power, disconnect power from the system by unplugging all power cords from the power supplies. Using electrical power Do not connect the adapter to any other device. When unplugging the power cord, do not pull on the cord itself but pull on the plug. This product should be operated from the type of power indicated on the marking label. If you are not sure of the type of power available, consult your dealer or local power company. Do not allow anything to rest on the power cord. Do not locate this product where people will walk on the cord. If an extension cord is used with this product, make sure that the total ampere rating of the equipment plugged into the extension cord does not exceed the extension cord ampere rating. Also, make sure that the total rating of all products plugged into the wall outlet does not exceed the fuse rating. Do not overload a power outlet, strip or receptacle by plugging in too many devices. The overall system load must not exceed 80% of the branch circuit rating. If power strips are used, the load should not exceed 80% of the power strip's input rating. Basic care and tips for using your computer - 13 If this product's AC adapter is equipped with a three-wire grounded plug. The plug only fits in a grounded power outlet. Make sure the power outlet is properly grounded before inserting the AC adapter plug. Do not insert the plug into a non-grounded power outlet. Contact your electrician for details. Warning The grounding pin is a safety feature. Using a power outlet that is not properly grounded may result in electric shock and/or injury. Note The grounding pin also provides good protection from unexpected noise produced by other nearby electrical devices that may interfere with the performance of this product. The system can be powered using a wide range of voltages; 100 to 120 or 220 to 240 V or 100-240 V AC. The power cord included with the system meets the requirements for use in the country/region where the system was purchased. Power cords for use in other countries/regions must meet the requirements for that country/
region. For more information on power cord requirements, contact an authorized reseller or service provider. 14 - Basic care and tips for using your computer Guidelines for safe battery usage Warning Batteries may explode if not handled properly. Do not disassemble or dispose of them in fire. Do not tamper with batteries. Keep them away from children. Follow local regulations when disposing of used batteries. Important Replace the battery with the same type as that which came bundled with your product. Use of another battery may present a risk of fire or explosion. This notebook uses a Lithium battery. Do not use it in a humid, wet or corrosive environment. Do not put, store or leave your product in or near a heat source, in a high temperature location, in strong direct sunlight, in a microwave oven or in a pressurized container, and do not expose it to temperatures over 60 C (140 F). Failure to follow these guidelines may cause the battery to leak acid, become hot, explode or ignite and cause injury and/or damage. Do not pierce, open or disassemble the battery. If the battery leaks and you come into contact with the leaked fluids, rinse thoroughly with water and seek medical attention immediately. For safety reasons, and to prolong the lifetime of the battery, charging will not occur at temperatures below 0 C (32 F) or above 40 C (104 F). The full performance of a new battery is achieved only after two or three complete charge and discharge cycles. The battery can be charged and discharged hundreds of times, but it will eventually wear out. When the operation time becomes noticeably shorter than normal, buy a new battery. Use only the approved batteries, and recharge your battery only with the approved chargers designated for this device. Use the battery only for its intended purpose. Never use any charger or battery that is damaged. Do not short-circuit the battery. Accidental short-circuiting can occur when a metallic object such as a coin, clip or pen causes direct connection of the positive (+) and negative (-) terminals of the battery. (These look like metal strips on the battery.) This might happen, for example, when you carry a spare battery in Basic care and tips for using your computer - 15 your pocket or purse. Short-circuiting the terminals may damage the battery or the connecting object. The capacity and lifetime of the battery will be reduced if the battery is left in hot or cold places, such as in a closed car in summer or winter. Always try to keep the battery between 15 C and 25 C (59 F and 77 F). A device with a hot or cold battery may not work temporarily, even when the battery is fully charged. Battery performance is especially limited in temperatures well below freezing. Do not dispose of batteries in a fire as they may explode. Batteries may also explode if damaged. Dispose of batteries according to local regulations. Please recycle when possible. Do not dispose as household waste. Wireless devices may be susceptible to interference from the battery, which could affect performance. Note Please refer to www.acer.com for battery shipping documents. 16 - Warnings and regulatory information WARNINGS AND REGULATORY INFORMATION Optical drives CAUTION: This appliance contains a laser system and is classified as a "CLASS 1 LASER PRODUCT." In case of any trouble with this device, please contact your nearest AUTHORIZED service station. To prevent direct exposure to the laser beam, do not try to open the enclosure. CLASS 1 LASER PRODUCT CAUTION: INVISIBLE LASER RADIATION WHEN OPEN. AVOID EXPOSURE TO BEAM. APPAREIL A LASER DE CLASSE 1 PRODUIT LASERATTENTION: RADIATION DU FAISCEAU LASER INVISIBLE EN CAS DOUVERTURE. EVITTER TOUTE EXPOSITION AUX RAYONS. LUOKAN 1 LASERLAITE LASER KLASSE 1 VORSICHT:
ABDECKUNG GEFFNET NICHT DEM STRAHLL AUSSETZEN PRODUCTO LSER DE LA CLASE I ADVERTENCIA: RADIACIN LSER INVISIBLE AL SER ABIERTO. EVITE EXPONERSE A LOS RAYOS. ADVARSEL: LASERSTRLING VEDBNING SE STRLEN. VARO! LAVATTAESSA OLET ALTTINA LASERSTEILYLLE. VARNING: LASERSTRLNING NR DENNA DEL R PPNAD L TUIJOTA STEESEENSTIRRA EJ IN I STRLEN VARNING:
PPNADSTIRRA EJ IN I STRLEN ADVARSEL: LASERSTRLING NAR DEKSEL PNESSTIRR IKKE INN I STRLEN LASERSTRLNING NAR DENNA DEL LASERSTRAHLUNG, WENN UNSICHTBARE IKKE IND R I Warnings and regulatory information - 17 Telephone line safety Disconnect all telephone lines from the equipment when not in use and/or before servicing. To avoid the remote risk of electric shock from lightning, do not connect the telephone line to this equipment during lightning or thunderstorms. Emergency calls Warning You cannot make emergency calls through this device. To make an emergency call you shall dial out through your mobile phone or other telephone call system. Medical devices Operation of any radio transmitting equipment, including wireless phones, may interfere with the functionality of inadequately protected medical devices. Consult a physician or the manufacturer of the medical device to determine if they are adequately shielded from external RF energy or if you have any questions. Switch off your device in health care facilities when any regulations posted in these areas instruct you to do so. Hospitals or health care facilities may be using equipment that could be sensitive to external RF transmissions. Pacemakers. Pacemaker manufacturers recommend that a minimum separation of 15.3 centimeters (6 inches) be maintained between wireless devices and a pacemaker to avoid potential interference with the pacemaker. These recommendations are consistent with the independent recommendations of Wireless Technology Research. Persons with pacemakers should do the following:
Always keep the device more than 15.3 centimeters (6 inches) from research by and the pacemaker Not carry the device near your pacemaker when the device is switched on. If you suspect interference, switch off your device, and move it. 18 - Warnings and regulatory information Hearing aids. Some digital wireless devices may interfere with some hearing aids. If interference occurs, consult your service provider. Vehicles RF signals may affect improperly installed or inadequately shielded electronic systems in motor vehicles such as electronic fuel injection systems, electronic antiskid (anti-lock) braking systems, electronic speed control systems, and air bag systems. For more information, check with the manufacturer, or its representative, of your vehicle or any equipment that has been added. Only qualified personnel should service the device, or install the device in a vehicle. Faulty installation or service may be dangerous and may invalidate any warranty that may apply to the device. Check regularly that all wireless equipment in your vehicle is mounted and operating properly. Do not store or carry flammable liquids, gases, or explosive materials in the same compartment as the device, its parts, or enhancements. For vehicles equipped with an air bag, remember that air bags inflate with great force. Do not place objects, including installed or portable wireless equipment in the area over the air bag or in the air bag deployment area. If in-vehicle wireless equipment is improperly installed, and the air bag inflates, serious injury could result. Using your device while flying in aircraft is prohibited. Switch off your device before boarding an aircraft. The use of wireless teledevices in an aircraft may be dangerous to the operation of the aircraft, disrupt the wireless telephone network, and may be illegal. Potentially explosive environments Warning Do not operate a portable transmitter (including this wireless adapter) near unshielded blasting caps or in an explosive environment unless the transmitter has been modified to be qualified for such use. Switch off your device when in any area with a potentially explosive atmosphere and obey all signs and instructions. Potentially explosive atmospheres include areas where you would normally be advised to turn off your vehicle engine. Sparks in such areas could cause an Warnings and regulatory information - 19 explosion or fire resulting in bodily injury or even death. Switch off the device at refueling points such as near gas pumps at service stations. Observe restrictions on the use of radio equipment in fuel depots, storage, and distribution areas; chemical plants; or where blasting operations are in progress. Areas with a potentially explosive atmosphere are often, but not always, clearly marked. They include below deck on boats, chemical transfer or storage facilities, vehicles using liquefied petroleum gas
(such as propane or butane), and areas where the air contains chemicals or particles such as grain, dust or metal powders. Do not switch the notebook on when wireless phone use is prohibited or when it may cause interference or danger. Disposal instructions Do not throw this electronic device into the trash when discarding. To minimize pollution and ensure utmost protection of the global environment, please recycle. For more from Electrical and Electronics Equipment (WEEE) regulations, visit www.acer-group.com/public/Sustainability information on the Waste ENERGY STAR Acer's ENERGY STAR qualified products save your money by reducing energy cost and protecting the environment without sacrificing features or performance. Acer is proud to offer our customers products with the ENERGY STAR mark. What is ENERGY STAR?
Products that are ENERGY STAR qualified use less energy and prevent greenhouse gas emissions by meeting strict energy efficiency guidelines set by the U.S. Environmental Protection Agency. Acer is committed to offering products and services worldwide that help customers save money, conserve energy and improve the quality of our environment. The more energy we can save through higher energy efficiency, the more we reduce greenhouse gases and the risks to www.energystar.gov or www.energystar.gov/powermanagement. change. More information climate refers of 20 - Warnings and regulatory information Note Information in this section may not apply to your computer. Acer ENERGY STAR qualified products:
Produce less heat and reduce cooling loads, and warmer climates. Automatically go into "display sleep" and "computer sleep" within 10 and 30 minutes of inactivity respectively (Refer to the settings in Power Management). Wake the computer from sleep mode by pushing keyboard or moving mouse. Computers will save more than 80% energy at "sleep" mode. ENERGY STAR and the ENERGY STAR mark are registered U.S. marks Wireless adapter regulatory information Radio frequency interference Warning For safety reasons, turn off all wireless or radio transmitting devices when using your laptop under the following conditions. These devices may include, but are not limited to: wireless LAN (WLAN), Bluetooth and/or 3G. Remember to follow any special regulations in force in any area, and always switch off your device when its use is prohibited or when it may cause interference or danger. Use the device only in its normal operating positions. This device meets RF exposure guidelines when used normally. To successfully transmit data files or messages, this device requires a good quality connection to the network. In some cases, transmission of data files or messages may be delayed until such a connection is available. Parts of the device are magnetic. Metallic materials may be attracted to the device, and persons with hearing aids should not hold the device to the ear with the hearing aid. Do not place credit cards or other magnetic storage media near the device, because information stored on them may be erased. Use on aircraft Warnings and regulatory information - 21 Warning FCC and FAA regulations may prohibit airborne operation of radio-
frequency wireless devices (wireless adapters) because their signals could interfere with critical aircraft instruments. Ask the cabin crew before turning on your devices wireless adapter whilst on board. The wireless adapter and your health and These recommendations. The wireless adapter, like other radio devices, emits radio frequency electromagnetic energy. The level of energy emitted by the wireless adapter, however, is less than the electromagnetic energy emitted by other wireless devices such as mobile phones. The wireless adapter operates within the guidelines found in radio frequency safety standards and recommendations reflect the consensus of the scientific community and result from deliberations of panels and committees of scientists who continually review and interpret the extensive research literature. In some situations or environments, the use of the wireless adapter may be restricted by the proprietor of the building or responsible representatives of the applicable organization. Examples of such situations may include:
Using the wireless adapter on board airplanes, or Using the wireless adapter in any other environment where the risk of interference with other devices or services is perceived or identified as being harmful. standards If you are uncertain of the policy that applies to the use of wireless adapters in a specific organization or environment (an airport, for example), you are encouraged to ask for authorization to use the adapter before you turn it on. USA FCC and FAA The FCC with its action in ET Docket 96-8 has adopted a safety standard for human exposure to radio frequency (RF) electromagnetic energy emitted by FCC certified equipment. The wireless adapter meets the Human Exposure limits found in OET Bulletin 65, 22 - Warnings and regulatory information supplement C, 2001, and ANSI/IEEE C95.1, 1992. Proper operation of this radio according to the instructions found in this manual will result in exposure substantially below the FCCs recommended limits. The following safety precautions should be observed:
Do not touch or move antenna while the unit is transmitting or receiving. Do not hold any component containing the radio such that the antenna is very close or touching any exposed parts of the body, especially the face or eyes, while transmitting. Do not operate the radio or attempt to transmit data unless the antenna is connected; this behavior may cause damage to the radio. The use of wireless adapters in hazardous locations is limited by the constraints posed by the safety directors of such environments. The use of wireless adapters on airplanes is governed by the Federal Aviation Administration (FAA). The use of wireless adapters in hospitals is restricted to the limits set forth by each hospital. Warnings and regulatory information - 23 USA Federal Communications Commission (FCC) This device complies with Part 15 of the FCC Rules. Operation of the device is subject to the following two conditions:
This device may not cause harmful interference. This device must accept any interference that may cause undesired operation. Interference statement This wireless adapter has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This wireless adapter generates, uses, and can radiate radio frequency energy. If the wireless adapter is not installed and used in accordance with the instructions, the wireless adapter may cause harmful interference to radio communications. There is no guarantee, however, that such interference will not occur in a particular installation. If this wireless adapter does cause harmful interference to radio or television reception (which can be determined by turning the equipment off and on), the user is encouraged to try to correct the interference by taking one or more of the following measures:
Reorient or relocate the receiving antenna of the equipment experiencing the interference. Increase the distance between the wireless adapter and the equipment experiencing the interference. 24 - Warnings and regulatory information Connect the computer with the wireless adapter to an outlet on a circuit different from that to which the equipment experiencing the interference is connected. Consult the dealer or an experienced radio/TV technician for help. Canada Industry Canada (IC) This device complies with RSS247 of Industry Canada. Cet appareil se conforme RSS247 de Canada d'Industrie. European Union List of applicable countries This product must be used in strict accordance with the regulations and constraints in the country of use. For further information, contact the local office in the country of use. Please see http://ec.europa.eu/
enterprise/rtte/implem.htm for the latest country list. List of national codes This equipment may be operated in the following countries:
Country Austria Belgium Cyprus Czech Republic Denmark Estonia Finland France Germany Greece Hungary Ireland Italy Latvia ISO 3166 2 letter code Country AT BE CY CZ DK EE FI FR DE GR HU IE IT LV Malta Netherlands Poland Portugal Slovakia Slovenia Spain Sweden United Kingdom Iceland Liechtenstein Norway Switzerland Bulgaria ISO 3166 2 letter code MT NL PL PT SK SI ES SE GB IS LI NO CH BG Warnings and regulatory information - 25 Country Lithuania Luxembourg ISO 3166 2 letter code Country LT Romania Turkey LU ISO 3166 2 letter code RO TR Specific absorption rate information This device meets the EU requirements on the limitation of exposure of the general public to electromagnetic fields by way of health protection. The limits are part of extensive recommendations for the protection of the general public. These recommendations have been developed and checked by independent scientific organizations through regular and thorough evaluations of scientific studies. The unit of measurement for the European Council's recommended limit for mobile devices is the "Specific Absorption Rate" (SAR), and the SAR limit is 2.0 W/kg averaged over 10 grams of body tissue. It meets the requirements of International Commission on Non-Ionizing Radiation Protection (ICNIRP). For body worn operation, this device has been tested and meets the ICNIRP exposure guidelines and the European Standard, for use with dedicated accessories. Use of other accessories which contain metals may not ensure compliance with ICNIRP exposure guidelines. The low band 5.15 to 5.35 GHz is for indoor use only. This equipment complies with the essential requirements of the European Union directive 1999/5/EC. See Statements of European Union Compliance, and more details refer to the attached Declaration of Conformity. the English esky
[Czech]
Daansk
[Danish]
Hereby, ACER INC., declares that this devise is in compliance with the essential requirements and other relevant provisionns of Directive 1999/5/EC. ACER INC. tmto prohlauje, e toto zazen je ve shod se zkladnmi poadavky a dalmi pslunmi ustanovenmi smrnice 1999/5/ES. Undertegnede ACER INC. erklrer herved, at flgende udstyr overholder de vsentlige krav og vrige relevante krav i direktiv 1999/5/EF. 26 - Warnings and regulatory information Deutsch
[German]
Eesti
[Estonian]
Espaol
[Spanish]
[Greek]
Franais
[French]
slenska
[Icelandic]
Italiano
[Italian]
Latviski
[Latvian]
Lietuvi
[Lithuanian]
Hiermit erklrt ACER INC., dass sich das Gert Radiolan in bereinstimmung mit den grundlegenden Anforderungen und den brigen einschlgigen Bestimmungen der Richtlinie 1999/5/EG befindet. Kesolevaga kinnitab ACER INC. seadme vastavust direktiivi 1999/5/E phinuetele ja nimetatud direktiivist tulenevatele teistele asjakohastele stetele. Por medio de la presente ACER INC. declara que el dispositivo cumple con los requisitos esenciales y cualesquiera otras disposiciones aplicables o exigibles de la Directiva 1999/5/CE. ACER INC. 1999/5/ . Par la prsente ACER INC. dclare que cet appareil est conforme aux exigences essentielles et aux autres dispositions pertinentes de la directive 1999/5/
CE. Hr me lsir ACER INC. yfir v a er samrmi vi grunnkrfur og arar krfur, sem gera r eru tilskipun 1999/5/EC. Con la presente ACER INC. dichiara che questo dispositivo conforme ai requisiti essenziali ed alle altre disposizioni pertinenti stabilite dalla direttiva 1999/5/CE. Ar o ACER INC. deklar, ka ierce atbilst Direktvas 1999/5/EK btiskajm prasbm un citiem ar to saisttajiem noteikumiem. iuo ACER INC. deklaruoja, kad is renginys atitinka esminius reikalavimus ir kitas 1999/5/EB Direktyvos nuostatas. Warnings and regulatory information - 27 Malti
[Maltese]
Magyar
[Hungarian]
Nederlands
[Dutch]
Norsk
[Norwegiann]
Polski
[Polish]
Portugus
[Portuguese]
Slovensko
[Slovenian]
Slovensky
[Slovak]
Suomi
[Finnish]
Svenska
[Swedish]
Hawnhekk, ACER INC., jiddikjara li dan jikkonforma mal- ti ijiet essenzjali u ma provvedimenti o rajn relevanti li he mm fid-Dirrettiva 1999/5/EC. Alulrott, ACER INC. nyilatkozom, hogy a kszlk megfelel a vonatkoz alapveto kvetelmnyeknek s az 1999/5/EC irnyelv egyb elorsainak. Hierbij verklaart ACER INC. dat het toestel voldoet aan de essentile eisen en de andere relevante bepalingen van richtlijn 1999/5/EG. ACER INC. erklrer herved at utstyret er i samsvar med de grunnleggende krav og vrige relevante krav i direktiv 1999/5/EF. Niniejszym ACER INC. owiadcza, e urzdzenie jest zgodne z zasadniczymi wymogami oraz pozostaymi stosownymi postanowieniami Dyrektywy 1999/5/EC. ACER INC. declara que este dispostivo est conforme com os requisitos essenciais e outras disposies da Directiva 1999/5/CE. ACER INC. izjavlja, da je ta naprava skladna z bistvenimi zahtevami in ostalimi relevantnimi doloili Direktive 1999/5/ES. ACER INC. tmto vyhlasuje, e zariadenie spa zkladn poiadavky a vetky prslun ustanovenia Smernice 1999/5/ES. ACER INC. vakuuttaa tten ett tm laite on direktiivin 1999/5/EY oleellisten vaatimusten ja sit koskevienn direktiivin muiden ehtojen mukainen. Hrmed intygar ACER INC. att denna enhet str i verensstmmelse med vsentliga egenskapskrav och vriga relevanta bestmmelser som framgr av direktiv 1999/5/EG. 28 - Warnings and regulatory information France Pour la France mtropolitaine :
2,400 - 2,4835 GHz (Canaux 1 13) autoris en usage intrieur 2,400 - 2,454 GHz (canaux 1 7) autoris en usage extrieur Pour la Guyane et la Runion :
2,400 - 2,4835 GHz (Canaux 1 13) autoris en usage intrieur 2,420 - 2,4835 GHz (canaux 5 13) autoris en usage extrieur Pour tout le territoire Franais :
Seulement 5,15 -5,35 GHz autoris pour le 802.11a L'utilisation de cet equipement (2,4 GHz WLAN) est soumise certaines restrictions :
La puissance maximale autorise en intrieur est de 100 mW pour 2400 - 2483,5 MHz. La puissance maximale autorise est de 100 mW en extrieur pour 2400 - 2454 MHz. La puissance maximale autorise est de 10 mW en extrieur, 2454 -
2483,5 MHz. Pour les dernires restrictions, voir www.art-telecom.fr. Italy The use of this equipment is regulated by:
1.D.L.gs 1.8.2003, n. 259, article 104 (activity subject to general authorization) for outdoor use and article 105 (free use) for indoor use, in both cases for private use. 2.D.M. 28.5.03, for supply to public of RLAN access to networks and telecom services. Luso degli apparati regolamentato da:
1.D.L.gs 1.8.2003, n. 259, articoli 104 (attivit soggette ad autorizzazione generale) se utilizzati al di fuori del proprio fondo e 105 (libero uso) se utilizzati entro il proprio fondo, in entrambi i casi per uso private. 2.D.M. 28.5.03, per la fornitura al pubblico dellaccesso R-LAN alle reti e ai servizi di telecomunicazioni. Warnings and regulatory information - 29 Belgium Dans le cas d'une utilisation prive, l'extrieur d'un btiment, au-
dessus d'un espace public, aucun enregistrement n'est ncessaire pour une distance de moins de 300 m. Pour une distance suprieure 300 m un enregistrement auprs de l'IBPT est requise. Pour les enregistrements et licences, veuillez contacter l'IBPT. In geval van priv-gebruik, buiten een gebouw, op een openbare plaats, is geen registratie nodig, wanneer de afstand minder dan 300 m is. Voor een afstand groter dan 300 m is een registratie bij BIPT vereist. Voor registraties en te contacteren. licenties, gelieve BIPT Brazil Este equipamento opera em carter secundrio, isto , no tem direito a proteo contra interferncia prejudicial, mesmo de estaes do mesmo tipo, e no pode causar interferncia a sistemas operando em carter primrio. Pakistan Pakistan Telecommunication Authority (PTA) Approved. Morocco The operation of this product in the radio channel 2 (2417 MHz) is not authorized in the following cities: Agadir, Assa-Zag, Cabo Negro, Chaouen, Goulmima, Oujda, Tan Tan, Taourirt, Taroudant and Taza. The operation of this product in the radio channels 4, 5, 6 and 7 (2425
- 2442 MHz) is not authorized in the following cities: Aroport Mohamed V, Agadir, Aguelmous, Anza, Benslimane, Bni Hafida, Cabo Negro, Casablanca, Fs, Lakbab, Marrakech, Merchich, Mohammdia, Rabat, Sal, Tanger, Tan Tan, Taounate, Tit Mellil, Zag. Japan 5 GHz Korea 30 - Warnings and regulatory information Taiwan
;
Modifications to the product Acer cannot be held responsible for unauthorized modifications made by the user and the consequences thereof, which may alter the conformity of the product. Compliant with Russian regulatory certification FCC 15.21 You are cautioned that changes or modifications not expressly approved by the part responsible for compliance could void the users authority to operate the equipment. IC This device complies with licence-exempt RSS standard(s). Operation is subject to the following two conditions: (1) this device may not cause interference, and (2) this device must accept any interference, including interference that may cause undesired operation of the device. Industry Canada Warnings and regulatory information - 31 Le prsent appareil est conforme aux CNR d'Industrie Canada applicables aux appareils radio exempts de licence. L'exploitation est autorise aux deux conditions suivantes : (1) l'appareil ne doit pas produire de brouillage, et (2) l'utilisateur de l'appareil doit accepter tout brouillage radiolectrique subi, mme si le fonctionnement. le brouillage est susceptible d'en compromettre Under Industry Canada regulations, this radio transmitter may only operate using an antenna of a type and maximum (or lesser) gain approved for the transmitter by Industry Canada. To reduce potential radio interference to other users, the antenna type and its gain should be so chosen that the equivalent isotropically radiated power (e.i.r.p.) is not more than that necessary for successful communication. Conformment la rglementation d'Industrie Canada, le prsent metteur radio peut fonctionner avec une antenne d'un type et d'un gain maximal (ou infrieur) approuv pour l'metteur par Industrie Canada. Dans le but de rduire les risques de brouillage radiolectrique l'intention des autres utilisateurs, il faut choisir le type d'antenne et son gain de sorte que la puissance isotrope rayonne quivalente (p.i.r.e.) ne dpasse pas l'intensit ncessaire l'tablissement d'une communication satisfaisante. Operation in the band 5150-5250 MHz is only for indoor use to reduce the potential for harmful interference to co-channel mobile satellite systems. La bande 5 150-5 250 MHz est rservs uniquement pour une utilisation l'intrieur afin de rduire les risques de brouillage prjudiciable aux systmes de satellites mobiles utilisant les mmes canaux. Users are advised that high-power radars are allocated as primary users
(i.e. priority users) of the bands 5250-5350 MHz and 5650-5850 MHz and that these radars could cause interference and/or damage to LE-LAN devices. 32 - Warnings and regulatory information Les utilisateurs tes aviss que les utilisateurs de radars de haute puissance sont dsigns utilisateurs principaux (c.--d., qu'ils ont la priorit) pour les bandes 5 250-5 350 MHz et 5 650-5 850 MHz et que ces radars pourraient causer du brouillage et/ou des dommages aux dispositifs LAN-EL RF exposure:
FCC RF Radiation Exposure Statement:
1. This Transmitter must not be co-located or operating in conjunction with any other antenna or transmitter. 2. This equipment complies with FCC RF radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with a minimum distance of 0 centimeters between the radiator and your body. IC RF Radiation Exposure Statement:
This equipment complies with IC radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with minimum distance 0 cm between the radiator & your body. This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter. Dclaration d'exposition aux radiations:
Cet quipement est conforme aux limites d'exposition aux rayonnements IC tablies pour un environnement non contrl. Cet quipement doit tre install et utilis avec un minimum de 0 cm de distance entre la source de rayonnement et votre corps.
various | User manual 2 of 2 | Users Manual | 4.99 MiB | August 09 2017 / July 03 2018 |
USERS MANUAL 2 -
2017. All Rights Reserved. Spin 5 Covers: SP513-52N This revision: July 2017 Important This manual contains proprietary information that is protected by copyright laws. The information contained in this manual is subject to change without notice. Some features described in this manual may not be supported depending on the Operating System version. Images provided herein are for reference only and may contain information or features that do not apply to your computer. Acer Group shall not be liable for technical or editorial errors or omissions contained in this manual. Sign up for an Acer ID and enjoy great benefits Open the Acer Portal app to sign up for an Acer ID or sign in if you already have an Acer ID. There are three great reasons for you to get an Acer ID:
Create your own connected world. Get the latest offers and product information. Register your device for quick, personalized customer support. For more information, please visit the Acer BYOC website:
www.acer.com/byoc-start Model number: _________________________________ Serial number: _________________________________ Date of purchase: ______________________________ Place of purchase: ______________________________ TABLE OF CONTENTS Table of contents - 3 5 First things first Your guides ............................................. 5 Basic care and tips for using your computer.................................................. 5 Turning your computer off........................... 5 Taking care of your computer ..................... 6 Taking care of your AC adapter.................. 7 Cleaning and servicing................................ 7 Your Acer notebook tour 8 Screen view............................................. 8 Keyboard view......................................... 9 Back view .............................................. 10 Base view .............................................. 10 Left view ............................................... 11 USB Type-C information........................... 11 USB 3.0 information.................................. 11 Right view.............................................. 12 Using the keyboard 13 Lock keys............................................... 13 Special keys.............................................. 13 Hotkeys..................................................... 14 Windows keys........................................ 15 Using the Precision Touchpad 16 Touchpad gestures................................ 16 Changing touchpad settings.................. 18 Recovery 20 Creating a factory default backup.......... 20 Backing up your wireless and LAN drivers.................................................... 23 Restoring your computer ....................... 23 Reset this PC and keep my files............... 23 Reset this PC and remove everything ...... 24 27 Using a Bluetooth connection Enabling and disabling Bluetooth .......... 27 Enable Bluetooth and add a device .......... 27 Connecting to the Internet 29 Connecting to a wireless network.......... 29 Connecting to a wireless LAN................... 29 33 Bluelight Shield Securing your computer 35 Using a computer security lock.............. 35 Using passwords ................................... 35 Entering passwords .................................. 36 Fingerprint Reader 37 How to use the fingerprint reader .......... 37 BIOS utility 42 Boot sequence....................................... 42 Setting passwords ................................. 42 43 Power management Saving power......................................... 43 Battery pack 45 Battery characteristics ........................... 45 Charging the battery ................................. 45 Optimizing battery life ............................... 46 Checking the battery level......................... 47 Battery-low warning .................................. 47 Traveling with your computer 48 Disconnecting from the desktop ............ 48 Moving around....................................... 48 Preparing the computer ............................ 48 What to bring to meetings......................... 49 Taking the computer home.................... 49 Preparing the computer ............................ 49 What to take with you................................ 50 Special considerations.............................. 50 Setting up a home office ........................... 50 Traveling with the computer................... 51 Preparing the computer ............................ 51 What to take with you................................ 51 Special considerations.............................. 51 Traveling internationally......................... 51 Preparing the computer ............................ 52 What to bring with you .............................. 52 Special considerations.............................. 52 54 Universal Serial Bus (USB) 55 USB Type-C port 56 SD card reader Video and audio connectors 57 Connecting a monitor............................. 57 Headphones and microphone................ 57 HDMI 58 Frequently asked questions 60 Requesting service ................................ 62 Tips and hints for using Windows 10..... 63 How do I get to Start? ............................... 63 How do I turn off my computer?................ 63 How do I unlock my computer?................. 63 How do I set the alarm?............................ 65 Where are my apps?................................. 65 What is a Microsoft ID (account)?............. 66 How do I check for Windows updates?..... 67 Where can I get more information?........... 67 Internet and online security 68 First steps on the net ............................. 68 Protecting your computer.......................... 68 Choose an Internet Service Provider........ 68 Network connections................................. 70 Surf the Net!.............................................. 71 Internet security software.......................... 72 Getting started... In this section you will find:
Useful information on caring for your computer and your health Where to find the power button, ports and connectors Tips and tricks for using the touchpad and keyboard How to create recovery backups Guidelines for connecting to a network and using Bluetooth Information on using Acers bundled software FIRST THINGS FIRST First things first - 5 We would like to thank you for making this Acer notebook your choice for meeting your mobile computing needs. Your guides To help you use your Acer notebook, we have designed a set of guides:
First off, the Setup Guide helps you get started with setting up your computer. The Quick Guide introduces you to the basic features and functions of your new computer. For more on how your computer can help you to be more productive, please refer to the Users Manual. This guide contains detailed information on such subjects as system utilities, data recovery, expansion options and troubleshooting. Once you have connected to the internet, you can download updates for your computer from:
http://go.acer.com/?id=17883 1. The link will open the Acer Service & Support webpage. 2. Scroll down to Drivers and Manuals and search for your model by pasting in or manually entering the serial number, SNID, or product model. 3. From this page you can also download and install the Acer identification utility that will automatically detect your computers serial number and SNID and allow you to copy it to the clipboard. 4. Once you have found your product model, any updates, or documents will be listed. Basic care and tips for using your computer Turning your computer off To turn the power off, do any of the following:
Use the Windows shutdown command: Press the Windows key or select the Windows Start button, select Power > Shut down. 6 - First things first Right-click the Windows Start button > Shut down or sign out >
Shut down. If you need to power down the computer for a short while, but dont want to completely shut it down, you can put it to Sleep by doing any of the following:
Press the power button. Press the sleep hotkey. Press the Windows key or select the Windows Start button, select Power > Sleep. Right-click the Windows Start button > Shut down or sign out >
Sleep. Note If you cannot power off the computer normally, press and hold the power button for up to ten seconds to shut down the computer. If you turn off the computer and want to turn it on again, wait at least two seconds before powering up. Taking care of your computer Your computer will serve you well if you take care of it. Only use the adapter provided with your device, or an Acer-
approved adapter to power your device. Do not expose the computer to direct sunlight. Do not place it near sources of heat, such as a radiator. Do not expose the computer to temperatures below 0 C (32 F) or above 50 C (122 F). Do not subject the computer to magnetic fields. Do not expose the computer to rain or moisture. Do not spill water or any liquid on the computer. Do not subject the computer to heavy shock or vibration. Do not expose the computer to dust or dirt. Never place objects on top of the computer. Do not slam the computer display when you close it. Never place the computer on uneven surfaces. Taking care of your AC adapter First things first - 7 Here are some ways to take care of your AC adapter:
Do not connect the adapter to any other device. Do not step on the power cord or place heavy objects on top of it. Route the power cord and any cables away from where people walk. When unplugging the power cord, do not pull on the cord itself but pull on the plug. The total ampere ratings of the equipment plugged in should not exceed the ampere rating of the cord if you are using an extension cord. Also, the total current rating of all equipment plugged into a single wall outlet should not exceed the fuse rating. Cleaning and servicing When cleaning the computer, follow these steps:
1.Turn off the computer. 2.Disconnect the AC adapter. 3.Use a soft, moist cloth. Do not use liquid or aerosol cleaners. If your computer is dropped or visibly damaged, or does not work normally, please contact your nearest authorized Acer service center. 8 - Your Acer notebook tour YOUR ACER NOTEBOOK TOUR After setting up your computer as illustrated in the Setup Guide, let us show you around your new Acer computer. Screen view 1 2 3
#
1 2 3 Icon Item Microphones Webcam Touchscreen Description 4 array microphones for far-field technology that allows users to access Cortana up to 4 meters away. Web camera for video communication. A light next to the webcam indicates that the webcam is active. Displays computer output, supports multi-touch input. Keyboard view Your Acer notebook tour - 9 1 2 3 4
#
1 2 3 4 Icon Item Speakers Keyboard Fingerprint reader Touchpad Description Deliver stereo audio output. For entering data into your computer. See "Using the keyboard" on page 13. Fingerprint reader for Windows Hello and security. Touch-sensitive pointing device. The touchpad and selection buttons form a single surface. Press down firmly on the touchpad surface to perform a left click. Press down firmly on the lower right corner to perform a right click. 10 - Your Acer notebook tour Back view 1 2
#
1 2 Icon Item Ventilation and cooling fan Speakers Description Allows the computer to stay cool. Do not cover or obstruct the openings. Deliver stereo audio output. Base view 1 2
#
1 2 Icon Item Battery reset pinhole Ventilation and cooling fan Description Simulates removing and reinstalling the battery. Insert a paperclip into the hole and press for four seconds. Allows the computer to stay cool. Do not cover or obstruct the openings. Left view Your Acer notebook tour - 11 1 2 3 4 5 Icon Item DC-in jack HDMI port USB Type-C port with DC-in USB port USB port with power-off charging
#
1 2 3 4 5 USB Type-C information Description Connects to an AC adapter. Supports high-definition digital video connections. Connects to the provided USB Type-
C power adapter and to USB devices with a USB Type-C connector. Supports DisplayPort over USB-C. Connects to USB devices. Connects to USB devices. USB 3.1 Gen 1 with transfer speeds up to 5 Gbps. Supports DisplayPort audio/video output. Delivers up to 3 A at 5 V DC for USB charging. DC-in: requires power adapter or power source providing 45 W at 15~20 V. For optimal performance, please use a certified Acer power adapter or USB Power Delivery device. USB 3.0 information USB 3.0 compatible ports are blue. Compatible with USB 3.0 and earlier devices. For optimal performance, use USB 3.0-certified devices. Defined by the USB 3.0 specification (SuperSpeed USB). 12 - Your Acer notebook tour Right view 1 2 3 4 5 6 7
#
1 2 3 4 5 6 7 Icon Item
+ / -
Power indicator Battery indicator Description Indicates the computers power status. Indicates the computers battery status. Charging: The light shows amber when the battery is charging. Fully charged: The light shows blue when in AC mode. Adjusts the system volume. Connects to audio devices (e.g., speakers, headphones) or a headset with microphone. Accepts one Secure Digital (SD or SDHC) card. Only one card can operate at a time. USB port Connects to USB devices. Power button Turns the computer on and off. Noble lock slot Connects to a Noble-compatible Volume control key Headset/
speaker jack SD card reader security lock. USING THE KEYBOARD Using the keyboard - 13 The keyboard has full-sized keys and an embedded numeric keypad, separate cursor, lock, Windows, function and special keys. Lock keys The keyboard has lock keys which you can use to turn keyboard functions on and off. Lock key Caps Lock Description When Caps Lock is on, all alphabetic characters typed are in uppercase. When Num Lock is on, the keypad is in numeric mode. The keys function as a calculator (complete with the arithmetic operators +, -, *, and /). Use this mode when you need to do a lot of numeric data entry. Num Lock Special keys Fn includes keys that activate special Your computers keyboard functions. The function of each key is clearly marked with an icon. Icon Function Hotkey for second function Description Activates a second function on certain keys. E.g. press the Fn key to activate the F1 to F12 keys. Puts the computer in Sleep mode. Turns on / off the computer's network devices. Sleep Airplane mode Brightness down Decreases the screen brightness. Brightness up Display toggle Increases the screen brightness. Switches display output between the display screen, external monitor (if connected) and both. 14 - Using the keyboard Icon Function Display off Description Turns the display screen backlight off to save power. Press any key to return. Touchpad toggle Turns the built-in touchpad on and off. Keyboard backlight toggle Turns the keyboard backlight on and off. Speaker toggle Turns the speakers on and off. Decreases the sound volume. Volume down Volume up Increases the sound volume. Turns Numeric Lock on or off. NumLk Numeric Lock Hotkeys The computer uses hotkeys (key combinations) to access function keys and navigation commands. To activate hotkeys, press and hold the Fn key before pressing the other key in the hotkey combination. Hotkey Fn + Special keys (see page 13) Fn + Pg Up Fn + Pg Dn Scrolls to the beginning of a document. Scrolls to the end of a document. Function Function keys Activates the F1 to F12 keys. Home End Description Note It is not necessary to press the Fn key to use the F1 to F12 function keys when starting your computer or when using the BIOS. To swap the hotkey and special function of the F1 to F12 keys, change the function key setting in the BIOS (to open the BIOS press F2 when starting your computer, then select the Main menu and change Function key behavior to Function keys). Windows keys Using the keyboard - 15 The keyboard has two keys that perform Windows-specific functions. Key Windows key Application key Description Pressed alone it returns to the Start screen or to return to the last open app. It can also be used with other keys for special functions, please check Windows Help. This key has the same effect as clicking the right mouse button; it opens the application's context menu. 16 - Using the Precision Touchpad USING THE PRECISION TOUCHPAD The touchpad controls the arrow
(or 'cursor') on the screen. As you slide your finger across the touchpad, the cursor will follow this movement. The Precision Touchpad (PTP) is designed to provide a more uniform, smooth, and accurate touchpad experience. Many applications support precision touchpad gestures that use one or more fingers, however, some gestures may not be supported by the specific application or program you are using. Touchpad gestures Single-finger slide Slide a finger across the touchpad to move the cursor. Single-finger press or tap Press the touchpad down, or lightly tap the touchpad with your finger, to perform a 'click', which will select or start an item. Quickly repeat the tap to perform a double tap or
'double click'. Two-finger press Lightly tap the touchpad with two fingers to perform a
'right click'. In the Start screen, this will toggle the app commands. In most apps this will open a context menu related to the selected item. Two-finger slide Swiftly scroll through web pages, documents and playlists by placing two fingers on the touchpad and moving both in any direction. Two-finger pinch Zoom in and out of photos, maps and documents with a simple finger-and-thumb gesture. Using the Precision Touchpad - 17 Three-finger press Lightly tap the touchpad with three fingers to open Cortana
(if your computer supports Cortana) or open the Action Center (if your computer does not support Cortana). Three-finger swipe Swipe across the touchpad with three fingers. Swipe up to open Task View. Move the cursor over a window and tap the touchpad to select that window, or swipe downwards to exit Task View. Swipe down to minimize all open windows and show Desktop; swipe upwards to restore the minimized windows. Swipe left or right to switch between open windows. Four-finger press Lightly tap the touchpad with four fingers to open the Action Center. Four-finger swipe Swipe across the touchpad with four fingers. Swipe up to open Task View. Move the cursor over a window and tap the touchpad to select that window, or swipe downwards to exit Task View. Swipe down to minimize all open windows and show Desktop; swipe upwards to restore the minimized windows. Swipe left or right to switch between open desktops. The precision touchpad includes added technology features that help recognize and prevent unintentional gestures such as accidental taps, gestures, and pointer movement. Note The touchpad is sensitive to finger movement; the lighter the touch, the better the response. Please keep the touchpad and your fingers dry and clean. 18 - Using the Precision Touchpad Changing touchpad settings To change the touchpad settings to suit your personal requirements, please do the following. 1.In the icon tray in the lower right-hand corner of the screen, select the Notifications icon to open the Notifications pane. 2.Select All settings. 3.Select Devices > Mouse & touchpad. 4.Now you can adjust the settings to suit your personal needs. You can change the primary button for left- or right-handed use, turn the touchpad off if you prefer to use a mouse, or set a delay to prevent the cursor from moving if you accidentally tap the touchpad with your palm while working. Scroll down to see more settings. Using the Precision Touchpad - 19 20 - Recovery RECOVERY If you are having trouble with your computer, and the frequently asked questions (see Got a question? on page 59) do not help, you can recover your computer. This section describes the recovery tools available on your computer. Acer provides Acer Care Center, which allows you to reset your PC, refresh your PC, or create a factory default backup. If you cannot access Acer Care Center, go to Action Center. Or, click Settings in the Start menu, select Update & security and then click Recovery. Note Acer Care Center vary depending on model or Operating System. Important We recommend that you create a Factory Default Backup as soon as possible. In certain situations a full recovery will require a USB recovery backup. Creating a factory default backup Backup allows you to quickly and easily back up your operating system, installed apps and data. 1.From Start, select All apps then Acer. Select Acer Recovery Management in the list of Acer apps. Note Since the recovery backup requires at least 8 GB of storage after formatting, it is recommended to use a USB drive with a capacity of 16 GB or larger. 2.Select the Backup tab and click Get Started for Create Factory Default Backup to open the Recovery Drive window. Recovery - 21 3.Make sure Backup system files to the recovery drive is selected and click Next. 4.Plug in the USB drive and wait for the PC to detect the USB drive then click Next. 22 - Recovery Since the recovery backup requires at least 8 GB of storage after formatting, it is recommended to use a USB drive with a capacity of 16 GB or larger. 5.Everything on the drive will be deleted. Click Create to continue. 6.You will be shown the backup progress on the screen. 7.Follow the process until it completes. 8.After creating the recovery backup, you can choose to delete the recovery this information, you can only use the USB recovery backup to restore your computer, if you lose or erase the USB drive, you cannot restore your computer. information on your computer. If you delete 9.Unplug the USB drive and label it clearly. Important Write a unique, descriptive label on the backup, such as 'Windows Recovery Backup'. Make sure you keep the backup in a safe place that you will remember. Recovery - 23 Backing up your wireless and LAN drivers Back up your wireless and LAN drivers. You can use these backups to install the wireless and LAN drivers if you install another operating system. 1.From Start, select All apps then Acer. Select Acer Recovery Management in the list of Acer apps. 2.Select the Backup tab and click Get started for Backup wireless and LAN drivers. Choose a folder to save your drivers and select OK. Restoring your computer Recovery Management allows you to quickly and easily restore your computer back to its default status. You can choose to keep your files or remove them before reinstalling Windows. Reset this PC and keep my files 1.From Start, select All apps then Acer. Select Acer Recovery Management in the list of Acer apps. 2.Select the Restore tab and click Get started to Choose an option. 24 - Recovery 3.Select Keep my files to refresh your PC and reinstall your operating system without removing your personal files. Click Next to continue. Important If you have apps installed on your PC, they will be removed. 4.Resetting the PC will reinstall Windows, change settings back to their factory defaults and remove all preinstalled apps and programs without removing your personal files. Click Reset to continue. 5.You will be shown the reset progress on the screen. The screen will turn off during the reset process. 6.The screen will turn back on when it is installing Windows. Your PC will restart several times during the reset process. 7.Follow the process until it completes. 8.When your PC has completed the reset process, Windows will have been reset back to its factory default settings without removing your personal files. Reset this PC and remove everything 1.From Start, select All apps then Acer. Select Acer Recovery Management in the list of Acer apps. 2.Select the Restore tab and click Get Started to Choose an option. Recovery - 25 3.Select Remove everything to reset your PC back to its factory default. This process will reinstall your operating system and remove all of your personal files, apps, and settings. 4.Select Just remove my files if you are keeping your computer. This will be quicker, but less secure. Files may still be recovered with a file recovery program. Select Remove files and clean the drive if you are not keeping 26 - Recovery your computer. This process will take longer, but will be more secure. Warning Selecting "Remove files and clean the drive" will remove all of your personal files and accounts, along with pre-existing drivers that may affect your Windows installation. 5. Click Reset to continue. 6.You will be shown the reset progress on the screen. The screen will turn off during the reset process. 7.The screen will turn back on when it is installing Windows. Your PC will restart several times during the reset process. 8.Follow the process until it completes. 9.When your PC has completed the reset process, Windows will use factory default settings. USING A BLUETOOTH CONNECTION Using a Bluetooth connection - 27 Bluetooth is a technology enabling you to transfer data wirelessly over short distances between many different types of devices. Bluetooth-
enabled devices include computers, cell phones, tablets, wireless headsets, and keyboards. To use Bluetooth, you must ensure the following:
1.Bluetooth is enabled on both devices. 2.Your devices are "paired" (or connected). Enabling and disabling Bluetooth The Bluetooth adapter must be enabled on both devices. For your computer, this may be an external switch, a software setting, or a separate Bluetooth dongle plugged into the computers USB port (if no internal Bluetooth adapter is available). Note Please check your devices owners manual to determine how to turn on its Bluetooth adapter. Enable Bluetooth and add a device Every new device must first be "paired" with your computers Bluetooth adapter. This means it must first be authenticated for security purposes. You only need to pair once. After that, simply turning on the Bluetooth adapter of both devices will connect them. Bluetooth on your computer is disabled by default. To enable your computers Bluetooth adapter, do the following:
1.Press the Windows key or select the Windows Start button >
Settings > Devices > Bluetooth, and click the toggle under Bluetooth to enable/disable it. 2.Your computer will automatically start searching for devices, as well as make itself visible to other devices. 28 - Using a Bluetooth connection 3.Select the device you wish to pair from the list of discovered devices, and select Pair. 4.A code displays on your computer, which should match the code displayed on your device. Select Yes. Then, accept the pairing from your device. Note Some devices using older versions of the Bluetooth technology require both devices to enter a PIN. In the case of one of the devices not having any inputs
(as in a headset), the passcode is hardcoded into the device (usually "0000"
or "1234"). Consult your devices user manual for more information. the Bluetooth settings by selecting You can also enter the Notifications icon in the lower right-hand corner of the screen to open the Notifications pane. From here, you can enable or disable Bluetooth or right-click on Bluetooth > Open settings to enter the Bluetooth settings. CONNECTING TO THE INTERNET Connecting to the Internet - 29 This chapter includes general information on types of connections, and getting connected to the internet. For detailed information, please refer to Network connections on page 70. Your computers built-in network features make it easy for you to connect your computer to the internet. First though, in order to connect to the internet from home, youll need to sign up for internet services from an ISP (Internet Service Provider)
-- usually a phone or cable company -- that will have to go to your home or office to set up internet service. The ISP will install a small box, a router or modem, that will allow you to connect to the internet. Connecting to a wireless network Connecting to a wireless LAN A wireless LAN (or WLAN) is a wireless local area network, which can link two or more computers without using wires. Once connected to WLAN, you can access the internet. You can also share files, other devices, and even your internet connection itself. Your computer's wireless connection is turned on by default and Windows will detect and display a list of available networks during setup. Select your network and enter the password if required. Warning Using wireless devices while flying in aircraft may be prohibited. All wireless devices must be switched off before boarding an aircraft and during take-off, as they may be dangerous to the operation of the aircraft, disrupt communications, and even be illegal. You may turn on your computers wireless devices only when informed that it is safe to do so by the cabin crew. Acer notebook computers feature an Airplane mode hotkey that turns the network connection on or off. You can use the network 30 - Connecting to the Internet management options to turn your wireless network on/off or control what is shared over the network. To connect to a wireless network, please follow the steps below. 1.Ensure you have a wireless router/access point and current internet connection through the ISP of your choice. Make a note of the wireless networks name and password (if necessary). If you are trying to connect to a public network (such as at a coffeeshop), make sure you have the wireless networks name. Note Please refer to your ISP or router documentation for details on connecting to the internet. 2.In the icon tray in the lower right-hand corner of the screen, select the Notifications icon to open the Notifications pane. 3.Select All settings. 4.Select Network & internet. 5.Make sure Wi-Fi is On and select Show available networks. Connecting to the Internet - 31 6.You will see a list of available wireless networks. Select the one you wish to use. 32 - Connecting to the Internet 7.Once you select a wireless network, select Connect. 8.If required, enter the networks password. BLUELIGHT SHIELD Bluelight Shield - 33 The Bluelight Shield can be enabled to reduce blue-light emissions from the screen to protect your eyes. To configure the Bluelight Shield, Search for Acer Quick Access in the Start Menu. From here you can toggle Bluelight Shield on or off, and you can choose from four different modes to fit your needs:
No. Item Low 1 Reduction 2 Medium Reduction High Reduction Long Hour Mode Description Reduces blue light emission from the LED backlit screen by 10% to 25% for basic protection. Reduces blue light emission from the LED backlit screen by 26% to 45% to protect your eyes. Reduces blue light emission from the LED backlit screen by 46% to 65% for maximum protection. Professionally tuned to reduce eye strain over an extended period of time. 3 4 Note Specifications vary depending on model or Operating System. Keeping your computer and data safe... In this section you will find:
How to secure your computer Setting passwords What you need to prepare when youre traveling How to get the most out of your battery SECURING YOUR COMPUTER Securing your computer - 35 Your computer is a valuable investment that you need to take care of. Learn how to protect and take care of your computer. Security features include hardware and software locks a security notch and passwords. Using a computer security lock The computer comes with a computer security slot for a security lock. Wrap a computer security lock cable around an immovable object such as a table or handle of a locked drawer. Insert the lock into the notch and turn the key to secure the lock. Some keyless models are also available. Using passwords Passwords protect your computer from unauthorized access. Setting these passwords creates several different levels of protection for your computer and data:
Supervisor Password prevents unauthorized entry into the BIOS utility. Once set, you must enter this password to gain access to the BIOS utility. See Setting passwords on page 42. User Password secures your computer against unauthorized use. Combine the use of this password with password checkpoints on boot-up and resume from Hibernation (if available) for maximum security. Password on Boot secures your computer against unauthorized use. Combine the use of this password with password checkpoints on boot-up and resume from Hibernation (if available) for maximum security. Important Do not forget your Supervisor Password! If you forget your password, please get in touch with your dealer or an authorized service center. 36 - Securing your computer Entering passwords When a password is set, a password prompt appears in the center of the display screen. When the Supervisor Password is set, a prompt appears when you enter the BIOS utility. Type the Supervisor Password and press Enter to access the BIOS utility. If you enter the password incorrectly, a warning message appears. Try again and press Enter. When the User Password is set and the password on boot parameter is enabled, a prompt appears at boot-up. Type the User Password and press Enter to use the computer. If you enter the password incorrectly, a warning message appears. Try again and press Enter. Important You have three chances to enter a password. If you fail to enter the password correctly after three tries, the system halts. Press and hold the power button for four seconds to shut down the computer. Then turn on the computer again, and try again. FINGERPRINT READER Fingerprint Reader - 37 In addition to using an account password or PIN to sign in to Windows apps and services, you can also use the fingerprint reader to sign-in and unlock your Acer notebook. In order to use the fingerprint reader, you must first configure the fingerprint reader to recognize your fingerprint to confirm your identity. How to use the fingerprint reader 1.Select the Start button, then select Settings > Accounts > Sign-in options to set up Windows Hello. 38 - Fingerprint Reader 2.Set a PIN code. 3.In Windows Hello, select Set up to configure the fingerprint reader. 4.In the Windows Hello set up window, select Get started to begin the fingerprint configuration. Fingerprint Reader - 39 5.Enter your PIN to confirm your identity. 40 - Fingerprint Reader 6.When the Windows Hello setup window appears, follow the onscreen directions. Press and hold your finger on the fingerprint sensor and fingerprint configuration is complete. this step until lift. Repeat then the 7.Once the fingerprint configuration is complete, you will be able to sign in or unlock your computer by placing your fingerprint on the fingerprint reader. You may select Add another to add another fingerprint to unlock the computer. Fingerprint Reader - 41 Note If the notebook has multiple accounts, you can set up access separately and automatically switch between accounts. 42 - BIOS utility BIOS UTILITY The BIOS utility is a hardware configuration program built into your computer's BIOS. Your computer is already properly configured and optimized, and you do not normally need to run this utility. However, if you encounter configuration problems, you may need to run it. To activate the BIOS utility, press F2 while the computer logo is being displayed. Boot sequence To set the boot sequence in the BIOS utility, activate the BIOS utility, then select Boot from the categories listed on the left of the screen. Setting passwords To set a password on boot, activate the BIOS utility, then select Security from the categories listed on the left of the screen. Find Set Supervisor Password and enter a password to enable this feature. Once you have entered a password for this feature, you may then enable/disable Password on Boot. Remember to select F10 to properly save and exit the BIOS utility when you are done making changes. POWER MANAGEMENT Power management - 43 This computer has a built-in power management unit that monitors system activity. System activity refers to any activity involving one or more of following devices: keyboard, mouse, hard disk, peripherals connected to the computer, and video memory. If no activity is detected for a period of time, the computer stops some or all of these devices in order to conserve energy. the Saving power Disable Fast startup Your computer uses Fast startup to start quickly, but also uses a small amount of power to check for signals to start. These checks will slowly drain your computers battery. If you prefer to reduce your computers power requirements and environmental impact, turn off Fast startup:
Note If Fast startup is off, your computer will take longer to start from Sleep. Your computer will also not start if it receives an instruction to start over a network (Wake on LAN). 1.Open the desktop. 2.Click Power Options in the Notification area. 3.Select Power & sleep settings. 4.Select Additional power settings. 5.Select Choose what the power buttons do. 44 - Power management 6.Select Change settings that are currently unavailable. 7.Scroll down and disable Turn on fast startup. 8.Select Save changes. BATTERY PACK Battery pack - 45 The computer uses an embedded Lithium battery that gives you long use between charges. Battery characteristics The battery is recharged whenever you connect the computer to the AC adapter. Your computer supports charge-in-use, enabling you to recharge the battery while you continue to operate the computer. However, recharging with the computer turned off significantly reduces charge time. The battery will come in handy when you travel or during a power failure. Charging the battery Plug the AC adapter into the computer, and connect to a mains power outlet. Note You are advised to charge the battery before retiring for the day. Charging the battery overnight before traveling enables you to start the next day with a fully charged battery. Conditioning a new battery pack Before you use a battery pack for the first time, there is a conditioning process that you should follow:
1.Connect the AC adapter and fully charge the battery. 2.Turn on the computer and complete setting up the operating system. 3.Disconnect the AC adapter. 4.Operate the computer using battery power. 5.Reconnect the AC adapter and fully charge the battery again. Follow these steps again until the battery has been charged and discharged three times. 46 - Battery pack Use this conditioning process for all new batteries, or if a battery hasn't been used for a long time. Warning Do not expose battery packs to temperatures below 0 C (32 F) or above 45 C (113 F). Extreme temperatures may adversely affect the battery pack. The battery conditioning process ensures your battery accepts the maximum possible charge. Failure to follow this procedure will prevent you from obtaining the maximum battery charge, and will also shorten the effective lifespan of the battery. In addition, the useful lifespan of the battery is adversely affected by the following usage patterns:
Using the computer on constant AC power. Not discharging and recharging the battery to its extremes, as described above. Frequent use; the more you use the battery, the faster it will reach the end of its effective life. An embedded battery has a life span of more than 1,000 charge/discharge cycles. Optimizing battery life Optimizing battery life helps you get the most out of battery operation, prolonging the charge/recharge cycle and improving recharging efficiency. You are advised to follow the suggestions set out below:
Use AC power whenever possible, reserving battery for mobile use. Remove accessories that are not being used (e.g. a USB disk drive), as they can continue to draw power. Store your PC in a cool, dry place. The recommended temperature is 10 C (50 F) to 30 C (86 F). Higher temperatures cause the battery to self-discharge faster. Excessive recharging decreases the battery life. Look after your AC adapter and battery. Checking the battery level The power meter indicates the current battery level. Rest the cursor over the battery/power icon on the taskbar to see the battery's present charge level. Battery pack - 47 Battery-low warning When using battery power pay attention to the power meter. Important Connect the AC adapter as soon as possible after the battery-low warning appears. Data may be lost if the battery is allowed to become fully depleted and the computer shuts down. When the battery-low warning appears, the recommended course of action depends on your situation:
Situation The AC adapter and a power outlet are available. The AC adapter or a power outlet is unavailable. Recommended Action 1. Plug the AC adapter into the computer, and then connect to the main power supply. 2. Save all necessary files. 3. Resume work. Turn off the computer if you want to recharge the battery rapidly. 1. Save all necessary files. 2. Close all applications. 3. Turn off the computer. 48 - Traveling with your computer TRAVELING WITH YOUR COMPUTER This section gives you tips and hints to consider when moving around or traveling with your computer. Disconnecting from the desktop Follow these steps to disconnect your computer from external accessories:
1.Save any open files. 2.Remove discs from optical drive. 3.Shut down the computer or put it into Sleep or Hibernate mode. 4.Close the display cover. 5.Disconnect the cord from the AC adapter. 6.Disconnect the keyboard, pointing device, printer, external monitor and other external devices. 7.Disconnect the Kensington / Noble lock if you are using one to secure the computer. Moving around When you are just moving within short distances, for example, from your office desk to a meeting room. Preparing the computer Before moving the computer, close and latch the display cover to place it in Sleep mode. You can now safely take the computer anywhere you go within the building. To wake the computer from Sleep mode, open the display and, if necessary, press and release the power button. If you are taking the computer to a client's office or a different building, you may choose to shut down the computer:
Press the Windows key, click Power then select Shut Down Or:
Traveling with your computer - 49 You can put the computer in Sleep mode by pressing the Sleep hotkey or by closing the display. When you are ready to use the computer again, open the display and, if necessary, press and release the power button. Note The computer may enter Hibernation or Deep Sleep mode after being in Sleep mode for a period of time. What to bring to meetings If your meeting is relatively short, you probably do not need to bring anything with you other than your computer. If your meeting will be longer, or if your battery is not fully charged, you may want to bring the AC adapter with you to plug in your computer in the meeting room. If the meeting room does not have an electrical outlet, reduce the drain on the battery by putting the computer in Sleep mode. Press the Sleep hotkey or close the display cover whenever you are not actively using the computer. Taking the computer home When you are moving from your office to your home or vice versa. Preparing the computer After disconnecting the computer from your desktop, follow these steps to prepare the computer for the trip home:
Check that you have removed all media and compact discs from the drive(s). Failure to remove the media can damage the drive head. Pack the computer in a protective case that can prevent the computer from sliding around and cushion it if it should fall. Warning Avoid packing items next to the top cover of the computer. Pressure against the top cover can damage the screen. 50 - Traveling with your computer What to take with you Unless you have some items at home, take the following items with you:
AC adapter and power cord. The printed Setup Guide. Special considerations Follow these guidelines to protect your computer while traveling to and from work:
Minimize the effects of temperature changes by keeping the computer with you. If you need to stop for an extended period of time and cannot carry the computer with you, leave the computer in the trunk of the car to avoid exposing the computer to excessive heat. Changes in temperature and humidity can cause condensation. Allow the computer to return to room temperature, and inspect the screen for condensation before turning on the computer. If the temperature change is greater than 10 C (18 F), allow the computer to come to room temperature slowly. If possible, leave the computer for 30 minutes in an environment with a temperature between outside and room temperature. Setting up a home office If you frequently work on your computer at home, you may want to purchase a second AC adapter for use at home. With a second AC adapter, you can avoid carrying the extra weight to and from home. If you use your computer at home for significant periods of time, you might also want to add an external keyboard, monitor or mouse. Traveling with the computer Traveling with your computer - 51 Important Check with your airline for any special requirements for travelling with Lithium batteries. When you are moving within a larger distance, for instance, from your office building to a client's office building or traveling locally. Preparing the computer Prepare the computer as if you were taking it home. Make sure that the battery in the computer is charged. Airport security may require you to turn on your computer when carrying it into the gate area. What to take with you Take the following items with you:
AC adapter Additional printer driver files if you plan to use another printer Special considerations In addition to the guidelines for taking the computer home, follow these guidelines to protect your computer while traveling:
Always take the computer as carry-on luggage. If possible, have the computer inspected by hand. Airport security X-
ray machines are safe, but do not put the computer through a metal detector. Traveling internationally Important Check with your airline for any special requirements for travelling with Lithium batteries. When you are moving from country to country. 52 - Traveling with your computer Preparing the computer Prepare the computer as you would normally prepare it for traveling. What to bring with you Bring the following items with you:
AC adapter. Power cords that are appropriate for your destination(s). Additional printer driver files if you plan to use another printer. Proof of purchase, in case you need to show it to customs officials. International Travelers Warranty passport. Special considerations Follow the same special considerations as when traveling with the computer. In addition, these tips are useful when traveling internationally:
When traveling in another country, check that the local AC voltage and the AC adapter power cord specifications are compatible. If not, purchase a power cord that is compatible with the local AC voltage. Do not use converter kits sold for appliances to power the computer. If you are using the modem, check if the modem and connector are compatible with the telecommunications system of the country you are traveling in. Ports and connectors... In this section you will find:
Information on the ports and connectors fitted to your computer 54 - Universal Serial Bus (USB) UNIVERSAL SERIAL BUS (USB) The USB port is a high-speed port which allows you to connect USB peripherals, such as a mouse, an external keyboard, additional storage (external hard disks), or any other compatible device. Note Two USB standards are currently available on Acer computers: USB 2.0
(High-speed USB) and USB 3.0 (SuperSpeed USB). USB 2.0 ports on Acer computers have a black tongue in the port, while USB 3.0 ports have a blue tongue. For best performance, USB 3.0 devices should always be plugged into USB 3.0 ports. Consult your devices documentation to see which standard it supports. You can also charge devices such as tablets, smartphones, or other devices through a USB port. Some USB 3.0 ports support charging devices when the computer is in Hibernate or turned off. Additionally, you can use a USB hub to connect multiple devices to a single USB port. Important When removing a USB storage device, you should right-click on the USB icon in the Windows task bar and select "Eject <device>" to tell the operating system to stop using the device before removing it. Failure to do this may result in data loss or damage to your peripheral. USB TYPE-C PORT USB Type-C port - 55 A USB Type-C port is a connector that allows you to easily connect USB Type-C peripherals, such as additional storage (e.g. an external drive), or any other compatible device. The Type-C port is reversable; connectors may be inserted with either side up. Note On Acer computers USB Type-C ports support up to USB 3.1 (SuperSpeed USB, 5 Gbps). Other USB or Thunderbolt devices with a USB Type-C connector are supported, but transfer speed may be reduced and certain functions will be disabled (such as Thunderbolt video support). Important When removing a USB storage device, you should right-click on the USB icon in the Windows task bar and select "Eject <device>" to tell the operating system to stop using the device before removing it. Failure to do this may result in data loss or damage to your peripheral. 56 - SD card reader SD CARD READER SD (Secure Digital) cards are used in a wide selection of digital cameras, tablets, media players and cellular phones. Inserting an SD card 1.Align the card so that the connector points towards the port, with the connectors facing down. 2.Carefully slide the card into the port. If you find you need to use any force to insert the card, try reorientating the card slightly. 3.Push the card until it clicks into place. A few millimetres of the card will extend from beyond the slot. If the card contains some files, the Windows AutoPlay window may appear (this depends on the contents of the card) and ask you if you wish to use a program to access the contents of the card. Important When removing an SD card, you should right-click on the USB icon in the Windows task bar and select "Eject <card name>" to tell the operating system to stop using the device before removing it. Failure to do this may result in data loss or damage to your peripheral. SD, SDHC and SDXC cards Different types of SD cards cover different capacities, while using the same overall design. SD cards contain up to 4 GB; SDHC cards contain up to 32 GB; and SDXC cards can contain up to 2048 GB
(2 TB). Your computer provides an SDHC or SDXC compatible card reader. Note SDXC memory cards can only be used in an SDXC-compatible reader; SD and SDHC cards can be used in either type. VIDEO AND AUDIO CONNECTORS Video and audio connectors - 57 Add an external monitor to your computer via a video port. The type of port available depends on your computers configuration. Connecting a monitor 1.Check that the computer is powered off and the monitor power switch is turned off. 2. Attach the video cable to the monitor port on the computer. 3.Connect the monitor power cable and plug it into a properly grounded wall outlet. 4.Follow any setup instructions in the monitor's user's guide. 5.Turn on power to the monitor, then the computer. 6.The correct resolution and refresh rate should be detected automatically. If necessary, change the display settings used by the computer. Note To access the display controls, right-click anywhere on the desktop and select Display settings. Headphones and microphone One or more 3.5 mm jacks on your computer allow you to connect audio devices. Use the headphone port to plug in stereo headphones or powered speakers; connecting an audio device to the headphone port disables the built-in speakers. Use the microphone port to connect an external microphone;
connecting a microphone disables the built-in microphone. Note Some computers have a single "combo" port that allows you to use single-pin headsets with a built-in microphone. These headsets are most commonly used with smartphones. 58 - HDMI HDMI HDMI (High-Definition Multimedia Interface) is a high-quality, digital audio/video interface. HDMI allows you to connect any compatible digital audio/video source, such as your computer, a set-top box, DVD player, and audio/video receiver to any compatible digital audio and/or video monitor, such as a digital television (DTV) with a single cable. The single cable keeps everything neat and tidy while ensuring easy connection and the best audio and visual quality. Got a question?
In this section you will find:
Frequently asked questions Tips for using Windows 10 Troubleshooting information How to protect yourself while online Where to find Acer service center contact information 60 - Frequently asked questions FREQUENTLY ASKED QUESTIONS The following is a list of possible situations that may arise during the use of your computer. Easy solutions are provided for each one. I turned on the power, but the computer does not start or boot up. Check if power is being supplied to the computer (if your computer has a power indicator, it will be off); if there is no power, check the following:
If you are using on the battery, it may be low and unable to power the computer. Connect the AC adapter to recharge the battery pack. You may need to wait a few minutes before trying to turn your computer on again. Make sure that the AC adapter is properly plugged into the computer and to the power outlet. If power is being supplied to the computer, check the following:
Do you have a USB storage device (USB drive, CD drive or smartphone) plugged into your computer? Unplug it and press Ctrl
+ Alt + Del to restart the system. Nothing appears on the screen. The computers power management system automatically blanks the screen to save power. Press any key to turn the display back on. If pressing a key does not turn the display back on, three things might be the cause:
The brightness level might be too low. Use the Brightness up hotkey to adjust the brightness level. The display device might be set to an external monitor. Press the display toggle hotkey to toggle the display back to the computer. The computer may be in Sleep or Hibernate mode (if there is a power LED, it will flash). Press and release the power button to resume. No audio is heard from the computer. Check the following:
The volume may be muted. Look at the volume control (speaker) Frequently asked questions - 61 icon in the taskbar. If it is crossed-out, click the icon and deselect the Mute all option. The volume level may be too low. Check the volume from the volume control (speaker) icon in the taskbar. You can also use the volume control hotkeys to adjust the volume. If headphones, earphones or external speakers are connected to the headphone jack on the computer, the internal speakers automatically turn off. The keyboard does not respond. Try attaching an external keyboard to a USB port on the computer. If it works, contact your dealer or an authorized service center as the internal keyboard cable may be loose. The printer does not work. Make sure that the printer is connected to a power outlet and that it is turned on. Make sure that the printer cable is connected securely to a USB port and the corresponding port on the printer. I want to restore my computer to its original settings. Note If your system is the multilingual version, the operating system and language you choose when you first turn on the system will be the only option for future recovery operations. This recovery process helps you restore the C: drive with the original software content that is installed when you purchased your computer. Warning Your C: drive will be reformatted and all data will be erased. It is important to back up all data files before using this option. Before performing a restore operation, please check the BIOS settings. 1.Check to see if Acer disk-to-disk recovery is enabled or not. 2.If there is a D2D Recovery setting in Main, make sure it is Enabled. 3.Exit the BIOS utility and save changes. The system will reboot. 62 - Frequently asked questions Note To access the BIOS utility, press F2 when you see the Acer logo during boot up. For more information, see Restoring your computer on page 23. Requesting service International Travelers Warranty (ITW) Your computer is backed by an International Travelers Warranty
(ITW) that gives you security and peace of mind when traveling. An ITW passport came with your computer and contains all you need to know about the ITW program. A list of available, authorized service centers is in this handy booklet. Read this passport thoroughly. Always have your ITW passport on hand, especially when you travel, to receive the benefits from our support centers. Attach your proof-of-
purchase to the ITW passport. If the country you are traveling in does not have an Acer-authorized ITW service site, you can still get in contact with our offices worldwide. Please visit www.acer.com. Before you call Please have the following information available when you call Acer for online service, and please be at your computer when you call. With your support, we can reduce the amount of time a call takes and help solve your problems efficiently. If there are error messages or beeps reported by your computer, write them down as they appear on the screen (or the number and sequence in the case of beeps). You are required to provide the following information:
Name:
Address:
Telephone number:
Machine and model type:
Serial number:
Date of purchase:
Frequently ask Frequently asked questions - 63 Tips and hints for using Windows 10 We know this is a new operating system that will take some getting used to, so we've created a few pointers to help you get started. How do I get to Start?
Tap the Start button on the lower left-hand corner of the screen. Wheres the Start button?
The Start button will appear in the desktop taskbar. Tapping it will open Start where you can launch apps. How do I see all of my apps?
Tap the Windows Start button and tap All apps to show a list of installed apps on the computer. How do I turn off my computer?
Tap the Windows Start button and tap the power icon > Shut down. Can I turn off notifications?
You can turn off notifications so that you can leave your computer running, but not be disturbed by notifications. Tap the Windows Start button and tap Settings > System >
Notifications & actions. From here you can enable/disable notifications for all of your apps or choose which apps to enable/
disable. How do I unlock my computer?
Swipe the lock screen upwards and tap a user account icon to unlock the computer. If your account has a password set, you will need to enter the password to continue. Can I personalize the Lock screen?
You can personalize the lock screen with a different image, to run a slideshow of images, or to show you quick status and notifications to suit your personal needs. 64 - Frequently asked questions To change the background, tap the Windows Start button and tap Settings > Personalization. From here you can:
Select a background image for the lock screen Turn the Slide show on or off Select lock screen apps. How do I set up the lock screen slideshow?
1.Tap the Windows Start button and select Settings >
Personalization. 2.Under Lock screen, select Slideshow. 3.Tap Add a folder and open the folder you wish to use (your Pictures folder will open by default). Tap Choose this folder to add the folder to the lock screen slideshow. 4.Select a folder and tap Remove to remove the folder from the lock screen slideshow. 5.Change the other settings to suit your needs. How do I move tiles?
Tap on a tile and drag it to the place on Start that you want it to appear. Other tiles will be moved to accommodate the tile in its new location. Can I arrange tiles in groups?
Yes, you can. Tap and hold a tile until you see the screen dim. Drag the tile to arrange Start to your liking. Can I make tiles bigger or smaller?
Yes, you can. Tap and hold a tile until you see the screen dim. Tap ... and select a size from the menu that appears. Can I change the screen resolution?
Yes, you can. Tap Search and use the onscreen keyboard to type
'Resolution' in the text box to display the results; tap Chang the screen resolution. Alternatively, you can also tap and hold anywhere on the screen and tap Display settings > Display > Advanced display settings. How do I set the alarm?
Frequently asked questions - 65 Your computer can act as an alarm clock. Type Alarms to search for the Alarms & Clock app. 1.Select an alarm from the list, or select the + in the lower-right corner to create a new alarm. 2.Enter the Alarm name. 3.Set the time by choosing the hour and minute. 4.Select AM or PM. 5.Choose which days the alarm should go off. 6.Select the sound notification. 7.Select the snooze time. 8.Tap the Save icon in the bottom right-hand corner to save the alarm. 9.Select On or Off to activate or deactivate the alarm. Hour Minutes Save Delete Note The alarm will only sound if your computer is awake at the set time. Where are my apps?
Tap Search and type the name of the app you would like to open using the pop-up keyboard. To view the complete list of apps, tap the Windows Start button and tap All apps. 66 - Frequently asked questions How do I make an app appear on Start?
If you're in All apps and you want to make an app appear on Start, tap and hold the app until you see the screen dim. When you release the app, tap Pin to Start from the menu that appears. How do I remove a tile from Start?
Tap and hold a tile until you see the screen dim. When you release the tile, tap the Unpin icon to remove the tile from Start. How do I make an app appear on my taskbar?
If you're in All apps and you want to make an app appear on the taskbar, tap and hold the app until you see the screen dim. When you release the app, tap More > Pin to taskbar from the menu that appears. How do I install apps?
You can download Windows Store apps from Store. You will need to have a Microsoft ID to purchase and download apps from Store. I can't find apps like Notepad and Paint! Where are they?
Tap Search and type the name of the app you would like to open using the pop-up keyboard. Alternatively, open All apps and scroll to Windows Accessories to see the list of legacy programs. What is a Microsoft ID (account)?
A Microsoft account is an email address and password that you use to sign in to Windows. You can use any email address, but it is best if you choose the one you already use to communicate with friends and sign in to your favorite websites. When you sign in to your PC with a Microsoft account, you'll connect your PC to the people, files, and devices you care about. Do I need one?
You do not need a Microsoft ID to use Windows 10, but it makes life easier because you can sync data across different machines you sign in to using a Microsoft ID. Frequently asked questions - 67 How do I get one?
If you've already installed Windows 10 and didn't sign in with a Microsoft account or you don't have a Microsoft account and want to get one, tap the Windows Start button > Settings > Accounts > Sign in with a Microsoft account, and follow the onscreen instructions. How do I check for Windows updates?
Tap the Windows Start button > Settings > Update & security >
Windows Update. Tap Advanced options to configure the settings. Where can I get more information?
For more information please visit the following pages:
Windows 10 information: go.acer.com/windows-tutorial Support FAQs: support.acer.com 68 - Internet and online security INTERNET AND ONLINE SECURITY First steps on the net Protecting your computer It is vital to protect your computer from viruses and attacks over the internet (see Internet security software on page 72). A comprehensive internet security program is offered when you first start your computer. You should activate this protection as soon as possible, certainly before you connect to the internet. Choose an Internet Service Provider Using the internet has become a natural part of daily computing. Just a few simple steps can connect you to a vast collection of knowledge and communication tools. To accomplish these steps you should first select an Internet Service Provider (ISP), which supplies the connection between your computer and the internet. You should research the ISPs available in your region, not forgetting to talk to friends and family about their experiences or to check reviews and consumer reports. The ISP you select will provide instructions on how to connect to the internet (you may need additional software or a special box that connects to your phone line). Connection types Depending on your computer model, your location and your communication needs, you have several ways to connect to the internet. Dial-up Some computers include a telephone dial-up (modem) connector. This allows you to connect to the internet using your telephone line. With a dial-up connection, you cannot use the modem and the telephone simultaneously on a single phone line. This type of connection is recommended only if you have limited use of the internet as the connection speed is low and connection time is typically charged per hour. Internet and online security - 69 DSL (e.g. ADSL) DSL (Digital Subscriber Line) is an always-on connection that runs over the phone line. As DSL and phone do not use the same frequencies, you can use your telephone at the same time you are connected to the internet (this requires a micro-filter on each telephone socket to avoid interference). To be eligible for DSL, you must be located near an DSL-equipped phone exchange (service is sometimes unavailable in rural areas). Connection speeds vary depending on your location, but DSL generally provides very fast and reliable internet connection. As the connection is always-on, it is generally charged at fixed monthly rates. Note A DSL connection requires an appropriate modem. A modem is usually provided by the ISP when you register. Many of these modems include an router that provides network and Wi-Fi access. Cable A cable connection provides fast and always-on internet service via a cable television line. This service is generally available in large cities. You can use your telephone and watch cable TV at the same time you are connected to the internet. Cellular A cellular connection allows you to use cellular networks (such as those used by a mobile phone) to connect to the internet while away from home. The socket for a SIM card may be built in to your computer, or may require an external device, such as a USB modem or even an appropriately equipped mobile phone. Note If your computer includes a SIM card slot, you require a compatible SIM card and a contract with a cellular provider. Before using the cellular features, check with your service provider to see if any additional charges will be incurred, especially roaming charges. 70 - Internet and online security Network connections A LAN (Local Area Network) is a group of computers (for example, within an office building or home) that share a common communications line and resources. When you set up a network, you can share files, peripheral devices (such as a printer) and an internet connection. You can set up a LAN using wired technologies (such as Ethernet) or wireless technologies (such as Wi-Fi or Bluetooth). Wireless networks A wireless LAN or WLAN is a wireless local area network, which may link two or more computers without using wires. Setting up a wireless network is easy and allows you to share files, peripheral devices and an internet connection. What are benefits of a wireless network?
Mobility Wireless LAN systems allow you and other users of your home network to share access to files and devices connected to the network, for example a printer or scanner. Also you can share an internet connection with other computers in your home. Installation speed and simplicity Installing a wireless LAN system can be fast and easy and eliminates the need to pull cables through walls and ceilings. Components of a wireless LAN To set up your Wireless network at home you need to have the following:
Access point (router) Access points (routers) are two-way transceivers that broadcast data into the surrounding environment. Access points act as a mediator between wired and wireless network. Most routers have a built-in DSL modem that will allow you access to a high speed DSL internet connection. The ISP (Internet Service Provider) you have chosen normally supplies a modem/router with the subscription to their services. Read carefully the documentation supplied with your Access Internet and online security - 71 point/router for detailed setup instructions. Network cable (RJ45) A network cable (also called RJ45 cable) is used to connect the host computer to the access point (see illustration below); this type of cable may also be used to connect peripheral devices to the access point. Wireless adapter Most computers feature a wireless module and Wi-Fi button that turns the network connection on or off. You may also turn your wireless network on or off, or control what is shared over the network with the network management options. Search HomeGroup and then click on HomeGroup. Warning Using wireless devices while flying in aircraft may be prohibited. Switch off all devices before boarding an aircraft; they may be dangerous to the operation of the aircraft, disrupt communications, and even be illegal. After take off, ask the cabin crew if you may enable Wi-Fi. Surf the Net!
To surf the internet, you need a program called an internet browser. Microsoft Edge provides an easy and secure web browsing experience. As soon as you have your internet access installed and you are connected, from the Start Menu, click the Microsoft Edge tile or the icon located in the taskbar and take your internet experience to a new level!
Acer website To get you started why not visit our website, www.acer.com. Acer is dedicated to provide you with on-going personalized support. Check out our Support section to get help tailored to your needs. www.acer.com is your portal to a world of online activities and services: visit us regularly for the latest information and downloads!
72 - Internet and online security Internet security software To help you stay ahead of cybercriminals, Acer has partnered with Norton to offer you security for all your devices. Select Acer computers include protection by Norton Security Norton Security is pre-installed on select Acer computers, protecting your identity and financial data from viruses, spyware, malware and other online threats. Learn more about how to stay safe online and how to stay protected after your introductory subscription ends. Note Specifications vary depending on model or Operating System. Staying ahead of cybercriminals Stay ahead of hackers and cybercriminals by understanding the tactics they use to access your private data. Ensure your software is up to date Cybercriminals rely heavily upon software or platform vulnerabilities, as they are the easiest way to sneak malware into a user's device unnoticed, sometimes with little action on the user's part. Immediately after a software manufacturer announces an update, hackers are ready with malware that can breach holes in the software that would have been patched if the update was installed. How to stay safe: Perform any and all software updates as soon as they are available. Keep a lookout for fake or phishing emails Beware of emails that appear to be from a friend or business colleague that you know but seem a little odd. Maybe they didn't capitalize your name or there are misspellings. The email might be from cybercriminals who are trying to fool you into sending them your credit card number, social security number, or logging into a fake bank website that looks like yours but really isn't. How to stay safe: Use a strong antispam filter. If an email looks strange, don't click on anything and delete it immediately. Instead manually launch a browser and type in your bank's website address and log-in yourself. Internet and online security - 73 Don't be fooled if someone calls your phone A tech support scam is a form of online fraud where people call you on the phone saying they're Technical Support from a trusted company like Norton or Microsoft and that you have a virus. The main motive behind these scams is to extort money from the victim. Cybercriminals can also install malware such as keylogging software or backdoor Trojans in order to gain access to personal information. How to stay safe: Don't fall for phone calls that tell you your software or computer isn't working. Never give your personal information like social security or credit card numbers to someone that you don't know over the phone. Common threats cybercriminals use Now you know a few very common ways cybercriminals try to sneak onto your device or trick you into providing private information to them directly. Here are a few of the types of malware they like to deploy once they've got into a device and what to do if you're ever infected. Ransomware A form of malware that will encrypt personal data files on your computer and attached devices. Encryption converts files into another format, that can only be opened with a specific decryption key. Once the ransomware installs itself, it will display a warning message that the computer is now locked. The user is given a specific amount of money to pay as a "fine" and a timeframe in which to pay. Even if paid, the criminal might choose to not unencrypt the files anyway!
What to do if you're infected: Avoid getting infected in the first place by staying protected with internet security software like Norton Security. Also, perform regular backups of all your data either online or to a separate external hard drive that is only attached to your computer while performing the backup. Ransomware has been known to lock access to external hard drives attached to the computer. If you are infected with ransomware, think twice before you pay the ransom. There is no guarantee the cybercriminal will unlock your files and you'll be funding them to prey upon another innocent victim. 74 - Internet and online security Botnets A botnet is a string of infected, connected computers coordinated together to perform a task. Botnets gain access to your machine through some piece of malicious coding. Once the software is downloaded, the botnet will now contact its master computer and let it know that everything is ready to go. Now your computer, phone, tablet, or IoT device is entirely under the control of the person who created the botnet. Most people who are infected with botnets aren't even aware that their computer's security has become compromised!
What to do if you're infected: If you're infected you probably don't realize it as bots are notoriously quiet. Your Internet Service Provider might send you a notification alerting you that they found a threat on your network and that you need to remove the bot. If you have a bot, use internet security software like Norton Security to scan all of your devices. Viruses/Malware
"Virus" is the commonplace word for all malicious software programs for years now; however, a virus is just one type of malicious threat. A virus is classified as a self-replicating piece of malicious code that travels by inserting itself into files or programs. What to do if you're infected: Take steps to avoid infection by staying protected with internet security software like Norton Security. If you subscribed to Norton Security and think you may have a virus, contact Norton's on-call technicians to help eliminate the virus. Take special precautions when using public Wi-Fi Public Wi-Fi is available just about everywhere, from the local coffee shop to the hotels and airports you visit while traveling. While public Wi-Fi has made our lives a little easier, it also poses security risks to the personal information available on our laptops and smartphones. A virtual private network (VPN) gives you online privacy and anonymity by creating a private network from a public internet connection. VPNs mask your internet protocol (IP) address so your online actions are virtually untraceable as well as secure. One of the biggest security risks on public Wi-Fi are man-in-the-middle attacks (MITM). These attacks are akin to eavesdropping. Data is sent from point A
(computer) to point B (server/website), and an attacker can get in-
Internet and online security - 75 between these transmissions. They then set up tools programmed to
"listen in" on transmissions, intercept data that is specifically targeted as valuable, and capture the data, such as your login credentials and passwords. Use a virtual private network (VPN) to ensure your privacy and anonymity are protected when you use public Wi-Fi. VPN services can encrypt all the data that you send and receive while using a public Wi-Fi hotspot, securing your information from hackers and other users of the same connection. For more tips on how to stay safe Good security habits can reduce your exposure to online crime. By adopting a few basic behaviors, you can make big strides in reducing cybercrime risk:
Protect your accounts with strong, unique passwords that use a combination of at least 10 uppercase and lowercase letters, symbols and numbers. Don't click on random links or open unsolicited messages and attachments-particularly from people you don't know. Don't access any personal information or social media accounts over unprotected Wi-Fi networks. Use security software on your devices to help protect yourself from the latest threats. Protect your computer with Windows security tools Windows provides a variety of protection applications. Windows Updates If you have an active internet connection, Windows can check for important updates for your computer and install them automatically. These updates include security patches and program updates that can improve your computing experience and help protect your computer against new viruses and attacks. How do I know when my computer is at risk?
If the Action Center reports an alert, or if your computer behaves erratically, crashes unexpectedly or if some of your programs do not work correctly, your computer may be infected by malicious software. 76 - Internet and online security However, do not blame every computer problem on a virus! If you suspect your computer is infected, the first thing to do is update, if you have not already done so, and run your antivirus and anti-spyware software.
frequency | equipment class | purpose | ||
---|---|---|---|---|
1 | 2017-09-27 | 2422 ~ 2452 | DTS - Digital Transmission System | Class II permissive change or modification of presently authorized equipment |
2 | 5775 ~ 5775 | NII - Unlicensed National Information Infrastructure TX | ||
3 | 2402 ~ 2480 | DSS - Part 15 Spread Spectrum Transmitter | ||
4 | 2017-09-08 | 2422 ~ 2452 | DTS - Digital Transmission System | |
5 | 5775 ~ 5775 | NII - Unlicensed National Information Infrastructure TX | ||
6 | 2402 ~ 2480 | DSS - Part 15 Spread Spectrum Transmitter | ||
7 | 2017-08-10 | 5775 ~ 5775 | NII - Unlicensed National Information Infrastructure TX | Change in identification of presently authorized equipment. Original FCC ID: PPD-QCNFA344AH Grant Date: 08/21/2015 |
8 | JBP - Part 15 Class B Computing Device Peripheral | Change in identification of presently authorized equipment. Original FCC ID: PPD-QCNFA344AH Grant Date: 05/28/2015 | ||
9 | 2422 ~ 2462 | DTS - Digital Transmission System | ||
10 | 2402 ~ 2480 | DSS - Part 15 Spread Spectrum Transmitter |
app s | Applicant Information | |||||
---|---|---|---|---|---|---|
various | Effective |
2017-09-27
|
||||
various |
2017-09-08
|
|||||
various |
2017-08-10
|
|||||
various | Applicant's complete, legal business name |
Acer Incorporated
|
||||
various | FCC Registration Number (FRN) |
0013355508
|
||||
various | Physical Address |
8F, 88, Sec 1, Hsin Tai Wu Rd
|
||||
various |
Hsichih, Taipei Hsien, N/A 221
|
|||||
various |
Taiwan
|
|||||
app s | TCB Information | |||||
various | TCB Application Email Address |
t******@siemic.com
|
||||
various |
L******@ul.com
|
|||||
various | TCB Scope |
A4: UNII devices & low power transmitters using spread spectrum techniques
|
||||
various |
A1: Low Power Transmitters below 1 GHz (except Spread Spectrum), Unintentional Radiators, EAS (Part 11) & Consumer ISM devices
|
|||||
app s | FCC ID | |||||
various | Grantee Code |
HLZ
|
||||
various | Equipment Product Code |
344A
|
||||
app s | Person at the applicant's address to receive grant or for contact | |||||
various | Name |
H******** S******** L********
|
||||
various | Title |
Manager
|
||||
various | Telephone Number |
886-2******** Extension:
|
||||
various | Fax Number |
886-2********
|
||||
various |
H******@acer.com.tw
|
|||||
app s | Technical Contact | |||||
n/a | ||||||
app s | Non Technical Contact | |||||
n/a | ||||||
app s | Confidentiality (long or short term) | |||||
various | Does this application include a request for confidentiality for any portion(s) of the data contained in this application pursuant to 47 CFR § 0.459 of the Commission Rules?: | Yes | ||||
various | No | |||||
various | Long-Term Confidentiality Does this application include a request for confidentiality for any portion(s) of the data contained in this application pursuant to 47 CFR § 0.459 of the Commission Rules?: | Yes | ||||
various | No | |||||
various | If so, specify the short-term confidentiality release date (MM/DD/YYYY format) | 03/27/2018 | ||||
various | 03/07/2018 | |||||
if no date is supplied, the release date will be set to 45 calendar days past the date of grant. | ||||||
app s | Cognitive Radio & Software Defined Radio, Class, etc | |||||
various | Is this application for software defined/cognitive radio authorization? | No | ||||
various | Equipment Class | DTS - Digital Transmission System | ||||
various | NII - Unlicensed National Information Infrastructure TX | |||||
various | DSS - Part 15 Spread Spectrum Transmitter | |||||
various | JBP - Part 15 Class B Computing Device Peripheral | |||||
various | Description of product as it is marketed: (NOTE: This text will appear below the equipment class on the grant) | 802.11 a/b/g/n/ac + BT 4.1 M.2 2230 Type Card | ||||
various | 802.11a/b/g/n/ac + BT4.1 M.2 2230 Type Card | |||||
various | 802.11a/b/g/n/ac + BT 4.1 M.2 2230 Type Card | |||||
various | Related OET KnowledgeDataBase Inquiry: Is there a KDB inquiry associated with this application? | No | ||||
various | Yes | |||||
various | Modular Equipment Type | Single Modular Approval | ||||
various | Limited Single Modular Approval | |||||
various | Purpose / Application is for | Class II permissive change or modification of presently authorized equipment | ||||
various | Change in identification of presently authorized equipment. Original FCC ID: PPD-QCNFA344AH Grant Date: 08/21/2015 | |||||
various | Change in identification of presently authorized equipment. Original FCC ID: PPD-QCNFA344AH Grant Date: 05/28/2015 | |||||
various | Composite Equipment: Is the equipment in this application a composite device subject to an additional equipment authorization? | Yes | ||||
various | Related Equipment: Is the equipment in this application part of a system that operates with, or is marketed with, another device that requires an equipment authorization? | No | ||||
various | Grant Comments | CIIPC to add host Acer Notebook/Tablet Computer model N17W1. The highest reported SAR for body and simultaneous transmission mode are 1.16 W/kg and 1.05 W/kg respectively. Output power listed is maximum combined conducted. This device supports 20 and 40MHz bandwidths for 2.4 GHz. This module may be installed only by the OEM or an OEM integrator. This transmitter has been approved for use in mobile RF exposure category configurations with the antenna(s) installed to provide a separation distance of at least 20 cm from all persons. Installation in portable devices is limited to the display section of a laptop or notebook PC where the antennas used during SAR testing (or equivalent antennas) are installed to provide at least 1cm distance from the base of the device and with an antenna-to-antenna separation distance of at least 3cm. The antennas used for this transmitter must not be collocated or operating in conjunction with any other antenna or transmitter within a host device, except in accordance with FCC multi-transmitter product procedures. Grantee must provide installation and operating instructions for complying with FCC multi-transmitter product procedures. Grantee must coordinate with OEM integrators to determine applicable host configurations to ensure RF exposure compliance, including simultaneous transmission. | ||||
various | CIIPC to add host Acer Notebook/Tablet Computer model N17W1. The highest reported SAR for body and simultaneous transmission mode are 1.10 W/kg and 1.15 W/kg respectively. Output power listed is maximum combined conducted. This device supports 20, 40, and 80 MHz bandwidths. This module may be installed only by the OEM or an OEM integrator. This transmitter has been approved for use in mobile RF exposure category configurations with the antenna(s) installed to provide a separation distance of at least 20 cm from all persons. Installation in portable devices is limited to the display section of a laptop or notebook PC where the antennas used during SAR testing (or equivalent antennas) are installed to provide at least 1cm distance from the base of the device and with an antenna-to-antenna separation distance of at least 3cm. This device supports client-only operating modes in the 5150-5350 MHz and 5470-5725 MHz bands. The antenna(s) used for this transmitter must not be collocated or operating in conjunction with any other antenna or transmitter within a host device, except in accordance with FCC multi-transmitter product procedures. Grantee must provide installation and operating instructions for complying with FCC multi-transmitter product procedures. Grantee must coordinate with OEM integrators to determine applicable host configurations to ensure RF exposure compliance, including simultaneous transmission. | |||||
various | CIIPC to add host Acer Notebook/Tablet Computer model N17W1. The highest reported SAR for body and simultaneous transmission mode are <0.10 W/kg and 0.75 W/kg respectively. Output power listed is maximum combined conducted. This module may be installed only by the OEM or an OEM integrator. This transmitter has been approved for use in mobile RF exposure category configurations with the antenna(s) installed to provide a separation distance of at least 20 cm from all persons. Installation in portable devices is limited to the display section of a laptop or notebook PC where the antennas used during SAR testing (or equivalent antennas) are installed to provide at least 1cm distance from the base of the device and with an antenna-to-antenna separation distance of at least 3cm. The antennas used for this transmitter must not be collocated or operating in conjunction with any other antenna or transmitter within a host device, except in accordance with FCC multi-transmitter product procedures. Grantee must provide installation and operating instructions for complying with FCC multi-transmitter product procedures. Grantee must coordinate with OEM integrators to determine applicable host configurations to ensure RF exposure compliance, including simultaneous transmission. | |||||
various | Class II permissive change to allow use in portable host with detection-based power reduction implementation and to disable CH12-13 as documented in this filing. Per KDB 616217 D04 v01r02 a separate FCC ID is required for each tablet with different sensor and antenna configurations. This FCC ID is for use of the module in Acer N17W2 convertible tablet PC. Output power listed is maximum combined conducted. This device supports 20 and 40MHz bandwidths for 2.4 GHz WLAN. The antennas used for this transmitter must not be collocated or operating in conjunction with any other antenna or transmitter within a host device, except in accordance with FCC multi-transmitter product procedures. Grantee must provide operating instructions for complying with FCC multi-transmitter product procedures. The highest reported SAR value in this filing is 1.19 W/kg. | |||||
various | Class II permissive change to allow use in portable host with detection-based power reduction implementation and to disable CH12-13 as documented in this filing. Per KDB 616217 D04 v01r02 a separate FCC ID is required for each tablet with different sensor and antenna configurations. This FCC ID is for use of the module in Acer N17W2 convertible tablet PC. Output power listed is maximum combined conducted. This device supports 20, 40, and 80 MHz bandwidths. The antennas used for this transmitter must not be collocated or operating in conjunction with any other antenna or transmitter within a host device, except in accordance with FCC multi-transmitter product procedures. Grantee must provide operating instructions for complying with FCC multi-transmitter product procedures. The highest reported SAR value in this filing is 1.15 W/kg. | |||||
various | Class II permissive change to allow use in portable host with detection-based power reduction implementation and to disable CH12-13 as documented in this filing. Per KDB 616217 D04 v01r02 a separate FCC ID is required for each tablet with different sensor and antenna configurations. This FCC ID is for use of the module in Acer N17W2 convertible tablet PC. Output power listed is maximum combined conducted. The antennas used for this transmitter must not be collocated or operating in conjunction with any other antenna or transmitter within a host device, except in accordance with FCC multi-transmitter product procedures. Grantee must provide operating instructions for complying with FCC multi-transmitter product procedures. | |||||
various | Output power listed is maximum combined conducted. This device supports 20, 40, and 80 MHz bandwidths. This module may be installed only by the OEM or an OEM integrator. This transmitter has been approved for use in mobile RF exposure category configurations with the antenna(s) installed to provide a separation distance of at least 20 cm from all persons. Installation in portable devices is limited to the display section of a laptop or notebook PC where the antennas used during SAR testing (or equivalent antennas) are installed to provide at least 1cm distance from the base of the device and with an antenna-to-antenna separation distance of at least 3cm. This device supports client-only operating modes in the 5150-5350 MHz and 5470-5725 MHz bands. The antenna(s) used for this transmitter must not be collocated or operating in conjunction with any other antenna or transmitter within a host device, except in accordance with FCC multi-transmitter product procedures. Grantee must provide installation and operating instructions for complying with FCC multi-transmitter product procedures. Grantee must coordinate with OEM integrators to determine applicable host configurations to ensure RF exposure compliance, including simultaneous transmission. The highest reported SAR for body and simultaneous transmission conditions are 0.32 W/kg and 0.32 W/kg respectively. | |||||
various | Output power listed is maximum combined conducted. This device supports 20 and 40MHz bandwidths for 2.4 GHz. This module may be installed only by the OEM or an OEM integrator. This transmitter has been approved for use in mobile RF exposure category configurations with the antenna(s) installed to provide a separation distance of at least 20 cm from all persons. Installation in portable devices is limited to the display section of a laptop or notebook PC where the antennas used during SAR testing (or equivalent antennas) are installed to provide at least 1cm distance from the base of the device and with an antenna-to-antenna separation distance of at least 3cm. The antennas used for this transmitter must not be collocated or operating in conjunction with any other antenna or transmitter within a host device, except in accordance with FCC multi-transmitter product procedures. Grantee must provide installation and operating instructions for complying with FCC multi-transmitter product procedures. Grantee must coordinate with OEM integrators to determine applicable host configurations to ensure RF exposure compliance, including simultaneous transmission. The highest reported SAR for body and simultaneous transmission conditions are 0.77 W/kg and 0.77 W/kg respectively. | |||||
various | Output power listed is maximum combined conducted. This module may be installed only by the OEM or an OEM integrator. This transmitter has been approved for use in mobile RF exposure category configurations with the antenna(s) installed to provide a separation distance of at least 20 cm from all persons. Installation in portable devices is limited to the display section of a laptop or notebook PC where the antennas used during SAR testing (or equivalent antennas) are installed to provide at least 1cm distance from the base of the device and with an antenna-to-antenna separation distance of at least 3cm. The antennas used for this transmitter must not be collocated or operating in conjunction with any other antenna or transmitter within a host device, except in accordance with FCC multi-transmitter product procedures. Grantee must provide installation and operating instructions for complying with FCC multi-transmitter product procedures. Grantee must coordinate with OEM integrators to determine applicable host configurations to ensure RF exposure compliance, including simultaneous transmission. The highest reported SAR value was < 0.1W/Kg. | |||||
various | Is there an equipment authorization waiver associated with this application? | No | ||||
various | If there is an equipment authorization waiver associated with this application, has the associated waiver been approved and all information uploaded? | No | ||||
app s | Test Firm Name and Contact Information | |||||
various | Firm Name |
SGS Taiwan Ltd.
|
||||
various |
Bureau Veritas CPS (H.K.) Ltd. Taoyuan Branch
|
|||||
various | Name |
R****** W********
|
||||
various |
R******** C********
|
|||||
various | Telephone Number |
+886-******** Extension:
|
||||
various |
886-3******** Extension:
|
|||||
various | Fax Number |
+886-********
|
||||
various |
886 3********
|
|||||
various |
R******@sgs.com
|
|||||
various |
r******@tw.bureauveritas.com
|
|||||
Equipment Specifications | |||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
1 | 1 | 15C | CC | 2402 | 2480 | 0.003 | |||||||||||||||||||||||||||||||||||
1 | 2 | 15C | CC MO | 2412 | 2462 | 0.524 | |||||||||||||||||||||||||||||||||||
1 | 3 | 15C | CC MO | 2422 | 2452 | 0.484 | |||||||||||||||||||||||||||||||||||
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
2 | 1 | 15E | 38 CC MO | 5180 | 5240 | 0.072 | |||||||||||||||||||||||||||||||||||
2 | 2 | 15E | 38 CC MO | 5190 | 5230 | 0.06 | |||||||||||||||||||||||||||||||||||
2 | 3 | 15E | 38 CC MO | 5210 | 5210 | 0.014 | |||||||||||||||||||||||||||||||||||
2 | 4 | 15E | 38 CC MO ND | 5260 | 5320 | 0.066 | |||||||||||||||||||||||||||||||||||
2 | 5 | 15E | 38 CC MO ND | 5270 | 5310 | 0.057 | |||||||||||||||||||||||||||||||||||
2 | 6 | 15E | 38 CC MO ND | 5290 | 5290 | 0.02 | |||||||||||||||||||||||||||||||||||
2 | 7 | 15E | 38 CC MO ND | 5500 | 5720 | 0.073 | |||||||||||||||||||||||||||||||||||
2 | 8 | 15E | 38 CC MO ND | 5510 | 5710 | 0.054 | |||||||||||||||||||||||||||||||||||
2 | 9 | 15E | 38 CC MO ND | 5530 | 5690 | 0.047 | |||||||||||||||||||||||||||||||||||
2 | 1 | 15E | 38 CC MO | 5745 | 5825 | 0.078 | |||||||||||||||||||||||||||||||||||
2 | 11 | 15E | 38 CC MO | 5775 | 5775 | 0.0136 | |||||||||||||||||||||||||||||||||||
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
3 | 1 | 15C | CC | 2402.00000000 | 2480.00000000 | 0.0200000 | |||||||||||||||||||||||||||||||||||
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
4 | 1 | 15C | CC | 2402 | 2480 | 0.003 | |||||||||||||||||||||||||||||||||||
4 | 2 | 15C | CC MO | 2412 | 2462 | 0.524 | |||||||||||||||||||||||||||||||||||
4 | 3 | 15C | CC MO | 2422 | 2452 | 0.484 | |||||||||||||||||||||||||||||||||||
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
5 | 1 | 15E | 38 CC MO | 5180 | 5240 | 0.072 | |||||||||||||||||||||||||||||||||||
5 | 2 | 15E | 38 CC MO | 5190 | 5230 | 0.06 | |||||||||||||||||||||||||||||||||||
5 | 3 | 15E | 38 CC MO | 5210 | 5210 | 0.014 | |||||||||||||||||||||||||||||||||||
5 | 4 | 15E | 38 CC MO | 5260 | 5320 | 0.066 | |||||||||||||||||||||||||||||||||||
5 | 5 | 15E | 38 CC MO | 5270 | 5310 | 0.057 | |||||||||||||||||||||||||||||||||||
5 | 6 | 15E | 38 CC MO | 5290 | 5290 | 0.02 | |||||||||||||||||||||||||||||||||||
5 | 7 | 15E | 38 CC MO | 5500 | 5720 | 0.073 | |||||||||||||||||||||||||||||||||||
5 | 8 | 15E | 38 CC MO | 5510 | 5710 | 0.054 | |||||||||||||||||||||||||||||||||||
5 | 9 | 15E | 38 CC MO | 5530 | 5690 | 0.047 | |||||||||||||||||||||||||||||||||||
5 | 1 | 15E | 38 CC MO | 5745 | 5825 | 0.078 | |||||||||||||||||||||||||||||||||||
5 | 11 | 15E | 38 CC MO | 5775 | 5775 | 0.0136 | |||||||||||||||||||||||||||||||||||
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
6 | 1 | 15C | CC | 2402.00000000 | 2480.00000000 | 0.0200000 | |||||||||||||||||||||||||||||||||||
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
7 | 1 | 15E | 38 CC MO | 5180 | 5240 | 0.072 | |||||||||||||||||||||||||||||||||||
7 | 2 | 15E | 38 CC MO | 5190 | 5230 | 0.06 | |||||||||||||||||||||||||||||||||||
7 | 3 | 15E | 38 CC MO | 5210 | 5210 | 0.014 | |||||||||||||||||||||||||||||||||||
7 | 4 | 15E | 38 CC MO | 5260 | 5320 | 0.066 | |||||||||||||||||||||||||||||||||||
7 | 5 | 15E | 38 CC MO | 5270 | 5310 | 0.057 | |||||||||||||||||||||||||||||||||||
7 | 6 | 15E | 38 CC MO | 5290 | 5290 | 0.02 | |||||||||||||||||||||||||||||||||||
7 | 7 | 15E | 38 CC MO | 5500 | 5720 | 0.073 | |||||||||||||||||||||||||||||||||||
7 | 8 | 15E | 38 CC MO | 5510 | 5710 | 0.054 | |||||||||||||||||||||||||||||||||||
7 | 9 | 15E | 38 CC MO | 5530 | 5690 | 0.047 | |||||||||||||||||||||||||||||||||||
7 | 1 | 15E | 38 CC MO | 5745 | 5825 | 0.078 | |||||||||||||||||||||||||||||||||||
7 | 11 | 15E | 38 CC MO | 5775 | 5775 | 0.0136 | |||||||||||||||||||||||||||||||||||
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
8 | 1 | 15B | CC | ||||||||||||||||||||||||||||||||||||||
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
9 | 1 | 15C | CC | 2402 | 2480 | 0.003 | |||||||||||||||||||||||||||||||||||
9 | 2 | 15C | CC MO | 2412 | 2472 | 0.524 | |||||||||||||||||||||||||||||||||||
9 | 3 | 15C | CC MO | 2422 | 2462 | 0.484 | |||||||||||||||||||||||||||||||||||
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
10 | 1 | 15C | CC | 2402.00000000 | 2480.00000000 | 0.0200000 |
some individual PII (Personally Identifiable Information) available on the public forms may be redacted, original source may include additional details
This product uses the FCC Data API but is not endorsed or certified by the FCC