all | frequencies |
|
|
|
|
|
exhibits | applications |
---|---|---|---|---|---|---|---|---|
manuals | photos | label |
app s | submitted / available | |||||||
---|---|---|---|---|---|---|---|---|
1 2 3 |
|
Acer Regulatory Information and Safety Guide | Users Manual | 1002.29 KiB | February 28 2020 / August 27 2020 | delayed release | ||
1 2 3 |
|
User Manual | Users Manual | 4.01 MiB | February 28 2020 / August 27 2020 | delayed release | ||
1 2 3 |
|
Internal Photos | Internal Photos | 655.94 KiB | February 28 2020 / August 27 2020 | delayed release | ||
1 2 3 |
|
External Photos | External Photos | 584.87 KiB | February 28 2020 / August 27 2020 | delayed release | ||
1 2 3 |
|
ID Label/Location Info | ID Label/Location Info | 60.63 KiB | February 28 2020 / March 05 2020 | |||
1 2 3 |
|
Class II permissive change letter | Cover Letter(s) | 110.81 KiB | February 28 2020 / March 05 2020 | |||
1 2 3 |
|
Confidentiality | Cover Letter(s) | 77.63 KiB | February 28 2020 / March 05 2020 | |||
1 2 3 |
|
Declaration of authorization | Cover Letter(s) | 86.36 KiB | February 28 2020 / March 05 2020 | |||
1 2 3 |
|
FCC Grantee Signature Authorization Letter | Cover Letter(s) | 20.15 KiB | February 28 2020 / March 05 2020 | |||
1 2 3 |
|
FCC SAR Appendix B | RF Exposure Info | 3.47 MiB | February 28 2020 / March 05 2020 | |||
1 2 3 |
|
FCC SAR Appendix C | RF Exposure Info | 1.86 MiB | February 28 2020 / March 05 2020 | |||
1 2 3 | Operational Description | Operational Description | February 28 2020 | confidential | ||||
1 2 3 |
|
SAR Test Report | RF Exposure Info | 1.57 MiB | February 28 2020 / March 05 2020 | |||
1 2 3 |
|
Test Setup Photos | Test Setup Photos | 315.80 KiB | February 28 2020 / August 27 2020 | delayed release | ||
1 2 3 |
|
FCC Auth Ltr for Change of ID | Cover Letter(s) | 56.29 KiB | February 13 2020 / February 17 2020 | |||
1 2 3 |
|
FCC Auth Ltr for Change of ID New Grantee | Cover Letter(s) | 95.80 KiB | February 13 2020 / February 17 2020 |
1 2 3 | Acer Regulatory Information and Safety Guide | Users Manual | 1002.29 KiB | February 28 2020 / August 27 2020 | delayed release |
Regulatory Information and Safety Guide 2 -
2017. All Rights Reserved. Regulatory Information and Safety Guide This revision: 04/2017 TABLE OF CONTENTS Table of contents - 3 Important safety information for children Tips and information for comfortable use 5 Finding your comfort zone .......................... 5 Taking care of your vision........................... 6 Developing good work habits...................... 7 Protecting your hearing............................... 7 4 Basic care and tips for using your computer 8 Turning your computer on and off............... 8 Taking care of your computer ..................... 8 General ....................................................... 9 Pack your computer carefully...................... 9 Safety instructions ................................. 10 Product servicing ...................................... 10 Cleaning and servicing.............................. 10 Battery and adapter information ............ 11 Accessing the power................................. 11 Disconnecting the power source............... 11 Using electrical power............................... 11 Guidelines for safe battery usage ............. 13 Internal battery....................................... 15 Warnings and regulatory information 16 Optical drives......................................... 16 Telephone line safety............................. 17 Emergency calls........................................ 17 Medical devices ..................................... 17 Vehicles ................................................. 18 Potentially explosive environments........ 18 Disposal instructions.............................. 19 ENERGY STAR ..................................... 19 Wireless adapter regulatory information 20 Radio frequency interference.................... 20 Use on aircraft........................................... 21 The wireless adapter and your health....... 21 USA FCC and FAA............................... 21 FCC radio frequency interference requirements............................................. 22 RF exposure ............................................. 24 Canada Industry Canada (IC) .............. 24 European Union ........................................ 26 Compliant with Russian regulatory certification................................................ 29 4 - Important safety information for children IMPORTANT SAFETY INFORMATION FOR CHILDREN CAUTION - ELECTRICALLY OPERATED PRODUCT. THIS IS NOT A TOY. TO AVOID RISK OF ELECTRIC SHOCK OR FIRE IT SHOULD NOT BE USED WITHOUT ADULT SUPERVISION OR PLACED WHERE SMALL CHILDREN CAN REACH IT. CAUTION -
ELECTRICALLY OPERATED PRODUCT. Not recommended for children under 3 years of age. As with all electrical products, precautions should be observed during handling and use of electrical products to reduce the risk of electric shock.
"CAUTION for film bag - Keep away from small children; the thin film may cling to nose and mouth and prevent breathing."
As with the power supply (adapter) should not be handled by the children, precautions should be observed during handling and use to prevent electric shock and high temperature. Children should be very careful while handling the power supply
(adapter), in particular plugging the power supply into the receptacle
(power outlet). The product should not be placed on the bare skin (e.g. lap of a child) for long periods. The laptop should be placed on a flat surface, like a desk or tabletop, if intending to use it for more than a few minutes. The product, including power supply and battery pack, as applicable should not be left in the rain or exposure to water. If cleaning is necessary do not immerse in water; wipe clean with a damp cloth. The product, including power supply and battery pack, as applicable should not be dropped, crushed (stepped on) or otherwise abused. Children should be careful with the cable (wiring) between the power supply (adapter) and laptop, in particular as a potential trip hazard. An adult should periodically inspect the product for damage, including the power supply and casing around the battery pack, (as applicable, and replace or send for repair if necessary. Similarly, if a child notices damage or broken parts, this should be reported to an adult immediately so that the damaged parts can be replaced or repaired. TIPS AND INFORMATION FOR COMFORTABLE USE Tips and information for comfortable use - 5 Important Some of the information in this guide may not apply to your computer. Computer users may complain of eyestrain and headaches after prolonged use. Users are also at risk of physical injury after long hours of working in front of a computer. Long work periods, bad posture, poor work habits, stress, inadequate working conditions, personal health and other factors greatly increase the risk of physical injury. Incorrect computer usage may lead to carpal tunnel syndrome, tendonitis, tenosynovitis or other musculoskeletal disorders. The following symptoms may appear in the hands, wrists, arms, shoulders, neck or back:
Numbness, or a burning or tingling sensation. Aching, soreness or tenderness. Pain, swelling or throbbing. Stiffness or tightness. Coldness or weakness. If you have these symptoms, or any other recurring or persistent discomfort and/or pain related to computer use, consult a physician immediately and inform your company's health and safety department. The following section provides tips for more comfortable computer use. Finding your comfort zone Find your comfort zone by adjusting the viewing angle of the monitor, using a footrest, or raising your sitting height to achieve maximum comfort. Observe the following tips:
Refrain from staying too long in one fixed posture. 6 - Tips and information for comfortable use Avoid slouching forward and/or leaning backward. Stand up and walk around regularly to remove the strain on your leg muscles. Take short rests to relax your neck and shoulders. Avoid tensing your muscles or shrugging your shoulders. Install the external display, keyboard and mouse properly and within comfortable reach. If you view your monitor more than your documents, place the display at the center of your desk to minimize neck strain. Taking care of your vision Long viewing hours, wearing incorrect glasses or contact lenses, glare, excessive room lighting, poorly focused screens, very small typefaces and low-contrast displays could stress your eyes. The following sections provide suggestions on how to reduce eyestrain. Eyes Rest your eyes frequently. Give your eyes regular breaks by looking away from the monitor and focusing on a distant point. Blink frequently to keep your eyes from drying out. Display Keep your display clean. Keep your head at a higher level than the top edge of the display so your eyes point downward when looking at the middle of the display. Adjust the display brightness and/or contrast to a comfortable level for enhanced text readability and graphics clarity. Eliminate glare and reflections by:
placing your display in such a way that the side faces the window or any light source, minimizing room light by using drapes, shades or blinds, using a task light, changing the display's viewing angle, using a glare-reduction filter, Tips and information for comfortable use - 7 using a display visor, such as a piece of cardboard extended from the display's top front edge. Avoid adjusting your display to an awkward viewing angle. Avoid looking at bright light sources for extended periods of time. Developing good work habits The following work habits make computer use more relaxing and productive:
Take short breaks regularly and often. Perform some stretching exercises. Breathe fresh air as often as possible. Exercise regularly and maintain a healthy body. Warning We do not recommend using the computer on a couch or bed. If this is unavoidable, work for only short periods, take breaks regularly, and do some stretching exercises. Protecting your hearing Warning Permanent hearing if earphones or headphones are used at high volume for prolonged periods of time. loss may occur To protect your hearing, follow these instructions. Increase the volume gradually until you can hear clearly and comfortably. Do not increase the volume level after your ears have adjusted. Do not listen to music at high volumes for extended periods. Do not increase the volume to block out noisy surroundings. Decrease the volume if you can't hear people speaking near you. 8 - Basic care and tips for using your computer BASIC CARE AND TIPS FOR USING YOUR COMPUTER Read these instructions carefully. Keep this document for future reference. Follow all warnings and instructions marked on the product. Turning your computer on and off To turn on the computer, simply press and release the power button. Please refer to the setup poster for the location of the power button. Note If you cannot power off the computer normally, press and hold the power button for more than four seconds to shut down the computer. If you turn off the computer and want to turn it on again, wait at least two seconds before powering up. Taking care of your computer Your computer will serve you well if you take care of it. Do not expose the computer to direct sunlight. Do not place it near sources of heat, such as a radiator. Do not subject the computer to magnetic fields. Do not expose the computer to rain or moisture. Do not spill water or any liquid on the computer. Do not drop, bump, scratches, twist, hit, shake push, or place heavy objects on your computer, display, or external devices. Do not subject the computer to heavy shock or vibration. Do not expose the computer to dust or dirt. Never place objects on top of the computer. Do not slam the computer display when you close it. Never place the computer on uneven surfaces. Where possible, keep all objects at least 15 cm away from the computer to avoid causing computer damage. General Basic care and tips for using your computer - 9 Do not use this product near water. Do not place this product on an unstable cart, stand or table. If the product falls, it could be seriously damaged. Slots and openings are provided for ventilation to ensure reliable operation of the product and to protect it from overheating. These openings must not be blocked or covered. The openings should never be blocked by placing the product on a bed, sofa, rug or other similar surface. This product should never be placed near or over a radiator or heat register, or in a built-in installation unless proper ventilation is provided. Never push objects of any kind into this product through cabinet slots as they may touch dangerous voltage points or short-out parts that could result in a fire or electric shock. Never spill liquid of any kind onto or into the product. To avoid damage of internal components and to prevent battery leakage, do not place the product on a vibrating surface. Never use it under sporting, exercising, or any vibrating environment which will probably cause a short-circuit or damage rotor devices, HDD, optical drive, and even exposure risk from the lithium battery pack. The bottom surface, areas around ventilation openings and AC adapter may get hot. To avoid injury, ensure they do not come in contact with your skin or body. Your device and its enhancements may contain small parts. Keep them out of the reach of small children. The surface temperature of the base will rise during normal operation, particularly when plugged in to AC power. Allowing sustained contact with exposed skin can cause discomfort or burns. Pack your computer carefully Use a quality carrying case that provides adequate cushioning and protection. Do not pack your computer in a tightly packed suitcase or bag. 10 - Basic care and tips for using your computer Before putting your computer in a carrying case, make sure that it is off or in sleep mode. Do not put a computer in a carrying case while it is turned on. Safety instructions Product servicing Do not attempt to service this product yourself, as opening or removing covers may expose you to dangerous voltage points or other risks. Refer all servicing to qualified service personnel. Unplug this product from the wall outlet and refer servicing to qualified service personnel when:
The power cord or plug is damaged, cut or frayed. Liquid was spilled into the product. The product was exposed to rain or water. The product has been dropped or the case has been damaged. The product exhibits a distinct change in performance, indicating a need for service. The product does not operate normally after following the operating instructions. The product exhibits a distinct change in performance, indicating a need for service. The product does not operate normally after following the operating instructions. Note Adjust only those controls that are covered by the operating instructions, since improper adjustment of other controls may result in damage and will often require extensive work by a qualified technician to restore the product to normal condition. Cleaning and servicing When cleaning the computer, follow these steps:
1.Turn off the computer and remove the battery pack if applicable. Basic care and tips for using your computer - 11 2.Disconnect the AC adapter. 3.Use a soft, moist cloth. Do not use liquid or aerosol cleaners. Prevent Electrostatic discharge: A discharge of static electricity from finger or other electrostatic conductors can seriously damage a battery, or other electronic components and cause loss of information deletion from electrostatic damage to a drive. Before handling an electronic device, discharge static electricity by touching an unpainted metal surface. Battery and adapter information Accessing the power Be sure that the power outlet you plug into is easily accessible and located as close to the equipment operator as possible. When you need to disconnect power to the equipment, be sure to unplug from the electrical outlet. Disconnecting the power source Observe the following guidelines when connecting and disconnecting power to the power supply unit:
Install the power supply unit before connecting to the AC power outlet. Unplug before removing the power supply unit from the computer. If the system has multiple sources of power, disconnect power from the system by unplugging all power cords from the power supplies. Using electrical power Do not connect the adapter to any other device. When unplugging the power cord, do not pull on the cord itself but pull on the plug. This product should be operated from the type of power indicated on the marking label. If you are not sure of the type of power available, consult your dealer or local power company. Do not allow anything to rest on the power cord. Do not locate this product where people will walk on the cord. 12 - Basic care and tips for using your computer If an extension cord is used with this product, make sure that the total ampere rating of the equipment plugged into the extension cord does not exceed the extension cord ampere rating. Also, make sure that the total rating of all products plugged into the wall outlet does not exceed the fuse rating. Do not overload a power outlet, strip or receptacle by plugging in too many devices. The overall system load must not exceed 80% of the branch circuit rating. If power strips are used, the load should not exceed 80% of the power strip's input rating. If this product's AC adapter is equipped with a three-wire grounded plug. The plug only fits in a grounded power outlet. Make sure the power outlet is properly grounded before inserting the AC adapter plug. Do not insert the plug into a non-grounded power outlet. Contact your electrician for details. Warning The grounding pin is a safety feature. Using a power outlet that is not properly grounded may result in electric shock and/or injury. Note The grounding pin also provides good protection from unexpected noise produced by other nearby electrical devices that may interfere with the performance of this product. The system can be powered using a wide range of voltages; 100 to 120 or 220 to 240 V or 100-240 V AC. The power cord included with the system meets the requirements for use in the country/region where the system was purchased. Power cords for use in other countries/regions must meet the requirements for that country/
region. For more information on power cord requirements, contact an authorized reseller or service provider. Guidelines for safe battery usage Basic care and tips for using your computer - 13 Warning When using a charging cart or a small space to simultaneously charge or operate multiple devices , the area must be well- ventilated and the temperature kept between 0 C (32 F) to 35 C (95 F) and battery charging must be stopped when 100% capacity is reached. Continuous charging can cause deformation or damage to the battery/
device. Precautions when charging batteries The useful lifespan of a battery is adversely affected by the following behavior:
Constantly charging the battery/device when already at full capacity. Charging the battery/device at temperatures above 35 C (95 F) or below 0 C (32 F). To prevent damage, follow these precautions:
Stop charging the battery once it reaches 100% capacity; regularly or frequently charging a fully charged battery for an extended period of time may cause battery deformation or damage. We recommend that you recharge the device when the battery level drops below 70% capacity. Do not charge battery in temperatures above 35 C (95 F) or below 0 C (32 F). Charging in abnormally high or abnormally low temperatures can cause battery deformation or damage. The charging port must be clean and free from debris and should only be used with Acer charging equipment. Use of a non-Acer battery or charging equipment can cause damage to the product and will void the warranty. If you plan to store the device for a long period of time, turn-off the device, remove AC power and store the product at room temperature (0 C - 35 C) in a dry (humidity: 45% - 80%), well-
ventilated area. Avoid direct sunlight, high temperatures and high humidity. Do not leave your devices battery completely discharged for a long period of time; this may cause battery deformation or damage. We recommend that the battery is checked and charged to approximately 50% capacity every 6 months. 14 - Basic care and tips for using your computer ONLY CHARGE THE BATTERY IN A CLEAN, WELL VENTILATED AREA. Warning Batteries may explode if not handled properly. Do not disassemble or dispose of batteries in fire. Do not short external contacts, crush, puncture or otherwise tamper with batteries. Keep batteries away from children. Follow local regulations when disposing of used batteries. Precautions when replacing the battery Improper replacement or mishandling could damage the battery, cause overheating, result in injury, and risk fire or explosion. Device with built-in battery: A built-in battery must be replaced by an authorized service center. Do not attempt to replace or remove the battery by yourself. Device with removable battery: The battery should only be replaced with parts approved by Acer. Do not replace the battery with any parts other than approved ones. This notebook uses a Lithium-based battery. Do not use it in a humid, wet or corrosive environment. Do not put, store or leave your product in or near a heat source, in a high temperature location, in strong direct sunlight, in a microwave oven or in a pressurized container, and do not expose it to temperatures over 50 C (122 F). Failure to follow these guidelines may cause the battery to leak acid, become hot, explode or ignite and cause injury and/or damage. Do not pierce, open or disassemble the battery. If the battery leaks and you come into contact with the leaked fluids, rinse thoroughly with water and seek medical attention immediately. For safety reasons, and to prolong the lifetime of the battery, charging will must not occur at temperatures below 0 C (32 F) or above 35 C (95 F). The full performance of a new battery is achieved only after two or three complete charge and discharge cycles. The battery can be charged and discharged hundreds of times, but it will eventually wear out. When the operation time becomes noticeably shorter than normal, check an authorized reseller to purchase a new battery. Basic care and tips for using your computer - 15 Use the battery only for its intended purpose. Never use any charger or battery that is damaged. Do not short-circuit the battery. Accidental short-circuiting can occur when a metallic object such as a coin, clip or pen causes direct connection of the positive (+) and negative (-) terminals of the battery. (These look like metal strips on the battery.) This might happen, for example, when you carry a spare battery in your pocket or purse. Short-circuiting the terminals may damage the battery or the connecting object. The capacity and lifetime of the battery will be reduced if the battery is left in hot or cold places, such as in a closed car in summer or winter. Always try to keep the battery between 15 C and 25 C (59 F and 77 F). A device with a hot or cold battery may not work temporarily, even when the battery is fully charged. Battery performance is especially limited in temperatures well below freezing. Do not dispose of batteries in a fire as they may explode. Batteries may also explode if damaged. Dispose of batteries according to local regulations. Please recycle when possible. Do not dispose as household waste. Wireless devices may be susceptible to interference from the battery, which could affect performance. Note Please refer to www.acer.com for battery shipping documents. Internal battery Do not attempt to replace a built-in rechargeable battery, battery replacement must be done by an Acer- authorized repair facility. Recharge the battery by following the instruction included in the product documentation. 16 - Warnings and regulatory information WARNINGS AND REGULATORY INFORMATION Optical drives CAUTION: This appliance contains a laser system and is classified as a "CLASS 1 LASER PRODUCT." In case of any trouble with this device, please contact your nearest AUTHORIZED service station. To prevent direct exposure to the laser beam, do not try to open the enclosure. CLASS 1 LASER PRODUCT CAUTION: INVISIBLE LASER RADIATION WHEN OPEN. AVOID EXPOSURE TO BEAM. APPAREIL A LASER DE CLASSE 1 PRODUIT LASERATTENTION: RADIATION DU FAISCEAU LASER INVISIBLE EN CAS DOUVERTURE. EVITTER TOUTE EXPOSITION AUX RAYONS. LUOKAN 1 LASERLAITE LASER KLASSE 1 VORSICHT:
ABDECKUNG GEFFNET NICHT DEM STRAHLL AUSSETZEN PRODUCTO LSER DE LA CLASE I ADVERTENCIA: RADIACIN LSER INVISIBLE AL SER ABIERTO. EVITE EXPONERSE A LOS RAYOS. ADVARSEL: LASERSTRLING VEDBNING SE STRLEN. VARO! LAVATTAESSA OLET ALTTINA LASERSTEILYLLE. VARNING: LASERSTRLNING NR DENNA DEL R PPNAD L TUIJOTA STEESEENSTIRRA EJ IN I STRLEN VARNING:
PPNADSTIRRA EJ IN I STRLEN ADVARSEL: LASERSTRLING NAR DEKSEL PNESSTIRR IKKE INN I STRLEN LASERSTRLNING NAR DENNA DEL LASERSTRAHLUNG, WENN UNSICHTBARE IKKE IND R I Warnings and regulatory information - 17 Telephone line safety Disconnect all telephone lines from the equipment when not in use and/or before servicing. To avoid the remote risk of electric shock from lightning, do not connect the telephone line to this equipment during lightning or thunderstorms. Emergency calls Warning You cannot make emergency calls through this device. To make an emergency call you shall dial out through your mobile phone or other telephone call system. Medical devices Operation of any radio transmitting equipment, including wireless phones, may interfere with the functionality of inadequately protected medical devices. Consult a physician or the manufacturer of the medical device to determine if they are adequately shielded from external RF energy or if you have any questions. Switch off your device in health care facilities when any regulations posted in these areas instruct you to do so. Hospitals or health care facilities may be using equipment that could be sensitive to external RF transmissions. Pacemakers. Pacemaker manufacturers recommend that a minimum separation of 15.3 centimeters (6 inches) be maintained between wireless devices and a pacemaker to avoid potential interference with the pacemaker. These recommendations are consistent with the independent recommendations of Wireless Technology Research. Persons with pacemakers should do the following:
Always keep the device more than 15.3 centimeters (6 inches) from research by and the pacemaker Not carry the device near your pacemaker when the device is switched on. If you suspect interference, switch off your device, and move it. 18 - Warnings and regulatory information Hearing aids. Some digital wireless devices may interfere with some hearing aids. If interference occurs, consult your service provider. Vehicles RF signals may affect improperly installed or inadequately shielded electronic systems in motor vehicles such as electronic fuel injection systems, electronic antiskid (anti-lock) braking systems, electronic speed control systems, and air bag systems. For more information, check with the manufacturer, or its representative, of your vehicle or any equipment that has been added. Only qualified personnel should service the device, or install the device in a vehicle. Faulty installation or service may be dangerous and may invalidate any warranty that may apply to the device. Check regularly that all wireless equipment in your vehicle is mounted and operating properly. Do not store or carry flammable liquids, gases, or explosive materials in the same compartment as the device, its parts, or enhancements. For vehicles equipped with an air bag, remember that air bags inflate with great force. Do not place objects, including installed or portable wireless equipment in the area over the air bag or in the air bag deployment area. If in-vehicle wireless equipment is improperly installed, and the air bag inflates, serious injury could result. Using your device while flying in aircraft is prohibited. Switch off your device before boarding an aircraft. The use of wireless devices in an aircraft may be dangerous to the operation of the aircraft, disrupt the wireless telephone network, and may be illegal. Potentially explosive environments Warning Do not operate a portable transmitter (including this wireless adapter) near unshielded blasting caps or in an explosive environment unless the transmitter has been modified to be qualified for such use. Switch off your device when in any area with a potentially explosive atmosphere and obey all signs and instructions. Potentially explosive atmospheres include areas where you would normally be advised to turn off your vehicle engine. Sparks in such areas could cause an Warnings and regulatory information - 19 explosion or fire resulting in bodily injury or even death. Switch off the device at refueling points such as near gas pumps at service stations. Observe restrictions on the use of radio equipment in fuel depots, storage, and distribution areas; chemical plants; or where blasting operations are in progress. Areas with a potentially explosive atmosphere are often, but not always, clearly marked. They include below deck on boats, chemical transfer or storage facilities, vehicles using liquefied petroleum gas
(such as propane or butane), and areas where the air contains chemicals or particles such as grain, dust or metal powders. Do not switch the notebook on when wireless phone use is prohibited or when it may cause interference or danger. Disposal instructions Do not throw this electronic device into the trash when discarding. To minimize pollution and ensure utmost protection of the global environment, please recycle. For more from Electrical and Electronics Equipment (WEEE) regulations, visit www.acer-group.com/public/Sustainability information on the Waste ENERGY STAR Acer's ENERGY STAR qualified products save your money by reducing energy cost and protecting the environment without sacrificing features or performance. Acer is proud to offer our customers products with the ENERGY STAR mark. What is ENERGY STAR?
Products that are ENERGY STAR qualified use less energy and prevent greenhouse gas emissions by meeting strict energy efficiency guidelines set by the U.S. Environmental Protection Agency. Acer is committed to offering products and services worldwide that help customers save money, conserve energy and improve the quality of our environment. The more energy we can save through higher energy efficiency, the more we reduce greenhouse gases and the risks to www.energystar.gov or www.energystar.gov/powermanagement. change. More information climate refers of 20 - Warnings and regulatory information Note Information in this section may not apply to your computer. Acer ENERGY STAR qualified products:
Produce less heat and reduce cooling loads, and warmer climates. Automatically go into "display sleep" and "computer sleep" within 10 and 30 minutes of inactivity respectively (Refer to the settings in Power Management). Wake the computer from sleep mode by pushing keyboard or moving mouse. Computers will save more than 80% energy at "sleep" mode. ENERGY STAR and the ENERGY STAR mark are registered U.S. marks Wireless adapter regulatory information Radio frequency interference Warning For safety reasons, turn off all wireless or radio transmitting devices when using your laptop under the following conditions. These devices may include, but are not limited to: wireless LAN (WLAN), Bluetooth and/or cellular. Remember to follow any special regulations in force in any area, and always switch off your device when its use is prohibited or when it may cause interference or danger. Use the device only in its normal operating positions. This device meets RF exposure guidelines when used normally. To successfully transmit data files or messages, this device requires a good quality connection to the network. In some cases, transmission of data files or messages may be delayed until such a connection is available. Parts of the device are magnetic. Metallic materials may be attracted to the device, and persons with hearing aids should not hold the device to the ear with the hearing aid. Do not place credit cards or other magnetic storage media near the device, because information stored on them may be erased. Use on aircraft Warnings and regulatory information - 21 Warning FCC and FAA regulations may prohibit airborne operation of radio-
frequency wireless devices (wireless adapters) because their signals could interfere with critical aircraft instruments. Ask the cabin crew before turning on your devices wireless adapter whilst on board. The wireless adapter and your health and These recommendations. The wireless adapter, like other radio devices, emits radio frequency electromagnetic energy. The level of energy emitted by the wireless adapter, however, is less than the electromagnetic energy emitted by other wireless devices such as mobile phones. The wireless adapter operates within the guidelines found in radio frequency safety standards and recommendations reflect the consensus of the scientific community and result from deliberations of panels and committees of scientists who continually review and interpret the extensive research literature. In some situations or environments, the use of the wireless adapter may be restricted by the proprietor of the building or responsible representatives of the applicable organization. Examples of such situations may include:
Using the wireless adapter on board airplanes, or Using the wireless adapter in any other environment where the risk of interference with other devices or services is perceived or identified as being harmful. standards If you are uncertain of the policy that applies to the use of wireless adapters in a specific organization or environment (an airport, for example), you are encouraged to ask for authorization to use the adapter before you turn it on. USA FCC and FAA The FCC with its action in ET Docket 96-8 has adopted a safety standard for human exposure to radio frequency (RF) electromagnetic energy emitted by FCC certified equipment. The wireless adapter meets the Human Exposure limits found in OET Bulletin 65, 22 - Warnings and regulatory information supplement C, 2001, and ANSI/IEEE C95.1, 1992. Proper operation of this radio according to the instructions found in this manual will result in exposure substantially below the FCCs recommended limits. The following safety precautions should be observed:
Do not touch or move antenna while the unit is transmitting or receiving. Do not hold any component containing the radio such that the antenna is very close or touching any exposed parts of the body, especially the face or eyes, while transmitting. Do not operate the radio or attempt to transmit data unless the antenna is connected; this behavior may cause damage to the radio. The use of wireless adapters in hazardous locations is limited by the constraints posed by the safety directors of such environments. The use of wireless adapters on airplanes is governed by the Federal Aviation Administration (FAA). The use of wireless adapters in hospitals is restricted to the limits set forth by each hospital. FCC radio frequency interference requirements Note Applies to device supporting IEEE 802.11a/ac wireless adapters. This device is restricted to indoor use due to its operation in the 5.15 to 5.25 GHz and 5.470 to 5.725 GHz frequency ranges. FCC requires this product to be used indoors for the frequency ranges 5.15 to 5.25 GHz and 5.470 to 5.725 GHz to reduce the potential for harmful interference to co-channel mobile satellite systems. High power radars are allocated as primary users of the 5.25 to 5.35 GHz and 5.65 to 5.85 GHz bands. These radar stations can cause interference with and /or damage this device. No configuration controls are provided for this wireless adapter allowing any change in the frequency of operations outside the FCC grant of authorization for U.S operation according to Part 15.407 of the FCC rules. USA Federal Communications Commission (FCC) Warnings and regulatory information - 23 Note The radiated output power of the adapter is far below the FCC radio frequency exposure limits. Nevertheless, the adapter should be used in such a manner that the potential for human contact during normal operation is minimized. To avoid the possibility of exceeding the FCC radio frequency exposure limits, you should keep a distance of at least 0 cm between you
(or any other person in the vicinity), or the minimum separation distance as specified by the FCC grant conditions, and the antenna that is built into the computer. Details of the authorized configurations can be found at www.fcc.gov/oet/ea/ by entering the FCC ID number on the device. This device complies with Part 15 of the FCC Rules. Operation of the device is subject to the following two conditions:
This device may not cause harmful interference. This device must accept any interference that may cause undesired operation. 15.21 You are cautioned that changes or modifications not expressly approved by the part responsible for compliance could void the users authority to operate the equipment. Interference statement This wireless adapter has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This wireless adapter generates, uses, and can radiate radio frequency energy. If the wireless adapter is not installed and used in accordance with the instructions, the wireless adapter may cause harmful interference to radio communications. There is no guarantee, however, that such interference will not occur in a particular installation. If this wireless adapter does cause harmful interference to radio or television reception (which can be determined by turning the equipment off and on), the user is encouraged to try to correct the interference by taking one or more of the following measures:
Reorient or relocate the receiving antenna of the equipment experiencing the interference. 24 - Warnings and regulatory information Increase the distance between the wireless adapter and the equipment experiencing the interference. Connect the computer with the wireless adapter to an outlet on a circuit different from that to which the equipment experiencing the interference is connected. Consult the dealer or an experienced radio/TV technician for help. RF exposure FCC RF Radiation Exposure Statement:
1.This Transmitter must not be co-located or operating in conjunction with any other antenna or transmitter. 2.This equipment complies with FCC RF radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with a minimum distance which states in DoC between the radiator and your body. Canada Industry Canada (IC) This device complies with RSS247 of Industry Canada. Cet appareil se conforme RSS247 de Canada d'Industrie. This device complies with Industry Canada licence-exempt RSS standard(s). Operation is subject to the following two conditions: (1) this device may not cause interference, and (2) this device must accept any interference, including interference that may cause undesired operation of the device. CAN ICES-3(B)/NMB-3(B) Le prsent appareil est conforme aux CNR d'Industrie Canada applicables aux appareils radio exempts de licence. L'exploitation est autorise aux deux conditions suivantes : (1) l'appareil ne doit pas produire de brouillage, et (2) l'utilisateur de l'appareil doit accepter tout brouillage radiolectrique subi, mme si le brouillage est susceptible d'en compromettre le fonctionnement. CAN ICES-3(B)/NMB-3(B) Warnings and regulatory information - 25 les rduire le but de Under Industry Canada regulations, this radio transmitter may only operate using an antenna of a type and maximum (or lesser) gain approved for the transmitter by Industry Canada. To reduce potential radio interference to other users, the antenna type and its gain should be so chosen that the equivalent isotropically radiated power (e.i.r.p.) is not more than that necessary for successful communication. Conformment la rglementation d'Industrie Canada, le prsent metteur radio peut fonctionner avec une antenne d'un type et d'un gain maximal (ou infrieur) approuv pour l'metteur par Industrie Canada. Dans risques de brouillage radiolectrique l'intention des autres utilisateurs, il faut choisir le type d'antenne et son gain de sorte que la puissance isotrope rayonne quivalente (p.i.r.e.) ne dpasse pas l'intensit ncessaire l'tablissement d'une communication satisfaisante. Operation in the band 5150-5250 MHz is only for indoor use to reduce the potential for harmful interference to co-channel mobile satellite systems. La bande 5 150-5 250 MHz est rservs uniquement pour une utilisation l'intrieur afin de rduire les risques de brouillage prjudiciable aux systmes de satellites mobiles utilisant les mmes canaux. Users are advised that high-power radars are allocated as primary users (i.e. priority users) of the bands 5250-5350 MHz and 5650-5850 MHz and that these radars could cause interference and/or damage to LE-LAN devices. Les utilisateurs tes aviss que les utilisateurs de radars de haute puissance sont dsigns utilisateurs principaux (c.--d., qu'ils ont la priorit) pour les bandes 5 250-5 350 MHz et 5 650-5 850 MHz et que ces radars pourraient causer du brouillage et/ou des dommages aux dispositifs LAN-EL. IC RF Radiation Exposure Statement:
This equipment complies with IC radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with minimum distance which states in DoC between the radiator & your body. This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter. 26 - Warnings and regulatory information Dclaration d'exposition aux radiations:
Cet quipement est conforme aux limites d'exposition aux rayonnements IC tablies pour un environnement non contrl. Cet quipement doit tre install et utilis avec un minimum de 0 cm de distance entre la source de rayonnement et votre corps. European Union List of applicable countries This product must be used in strict accordance with the regulations and constraints in the country of use. For further information, contact the local office in the country of use. Please see https://europa.eu/
european-union/about-eu/countries_en for the latest country list. Specific absorption rate information This device meets the EU requirements on the limitation of exposure of the general public to electromagnetic fields by way of health protection. The limits are part of extensive recommendations for the protection of the general public. These recommendations have been developed and checked by independent scientific organizations through regular and thorough evaluations of scientific studies. The unit of measurement for the European Council's recommended limit for mobile devices is the "Specific Absorption Rate" (SAR), and the SAR limit is 2.0 W/kg averaged over 10 grams of body tissue. It meets the requirements of International Commission on Non-Ionizing Radiation Protection (ICNIRP). For body worn operation, this device has been tested and meets the ICNIRP exposure guidelines and the European Standard, for use with dedicated accessories. Use of other accessories which contain metals may not ensure compliance with ICNIRP exposure guidelines. The low band 5.15 to 5.35 GHz is for indoor use only. This equipment complies with the essential requirements of the European Union directive 2014/53/EU. See Statements of European the Union Compliance, and more details refer to the attached Declaration of Conformity. Warnings and regulatory information - 27 Italy The use of this equipment is regulated by:
1.D.L.gs 1.8.2003, n. 259, article 104 (activity subject to general authorization) for outdoor use and article 105 (free use) for indoor use, in both cases for private use. 2.D.M. 28.5.03, for supply to public of RLAN access to networks and telecom services. Luso degli apparati regolamentato da:
1.D.L.gs 1.8.2003, n. 259, articoli 104 (attivit soggette ad autorizzazione generale) se utilizzati al di fuori del proprio fondo e 105 (libero uso) se utilizzati entro il proprio fondo, in entrambi i casi per uso private. 2.D.M. 28.5.03, per la fornitura al pubblico dellaccesso R-LAN alle reti e ai servizi di telecomunicazioni. Belgium Dans le cas d'une utilisation prive, l'extrieur d'un btiment, au-
dessus d'un espace public, aucun enregistrement n'est ncessaire pour une distance de moins de 300 m. Pour une distance suprieure 300 m un enregistrement auprs de l'IBPT est requise. Pour les enregistrements et licences, veuillez contacter l'IBPT. In geval van priv-gebruik, buiten een gebouw, op een openbare plaats, is geen registratie nodig, wanneer de afstand minder dan 300 m is. Voor een afstand groter dan 300 m is een registratie bij BIPT vereist. Voor registraties en te contacteren. licenties, gelieve BIPT 28 - Warnings and regulatory information Brazil Este equipamento opera em carter secundrio, isto , no tem direito a proteo contra interferncia prejudicial, mesmo de estaes do mesmo tipo, e no pode causar interferncia a sistemas operando em carter primrio. Pakistan Pakistan Telecommunication Authority (PTA) Approved. Morocco The operation of this product in the radio channel 2 (2417 MHz) is not authorized in the following cities: Agadir, Assa-Zag, Cabo Negro, Chaouen, Goulmima, Oujda, Tan Tan, Taourirt, Taroudant and Taza. The operation of this product in the radio channels 4, 5, 6 and 7 (2425
- 2442 MHz) is not authorized in the following cities: Aroport Mohamed V, Agadir, Aguelmous, Anza, Benslimane, Bni Hafida, Cabo Negro, Casablanca, Fs, Lakbab, Marrakech, Merchich, Mohammdia, Rabat, Sal, Tanger, Tan Tan, Taounate, Tit Mellil, Zag. Japan 5 GHz Korea Taiwan
;
Warnings and regulatory information - 29 Modifications to the product Acer cannot be held responsible for unauthorized modifications made by the user and the consequences thereof, which may alter the conformity of the product. Compliant with Russian regulatory certification
1 2 3 | User Manual | Users Manual | 4.01 MiB | February 28 2020 / August 27 2020 | delayed release |
USERS MANUAL 2 -
2019. All Rights Reserved. TravelMate P6 Covers: P614-51-G2 This revision: October 2019 Important This manual contains proprietary information that is protected by copyright laws. The information contained in this manual is subject to change without notice. Some features described in this manual may not be supported depending on the Operating System version. Images provided herein are for reference only and may contain information or features that do not apply to your computer. Acer Group shall not be liable for technical or editorial errors or omissions contained in this manual. Register your Acer product If your new device runs on Windows OS, you may have had your product registered automatically while you start up your device with Windows OS. Log in at www.acer.com/myproducts with the email address you registered for Windows OS to review your product record. (Reset your password if you do not know it.) If the record is not found, please follow the steps below to register. 1. Ensure you are connected to the Internet. 2. Go to www.acer.com/register-product. 3. Sign in or sign up for an Acer ID. 4. Enter S/N or SNID of your device to register it. Model number: _________________________________ Serial number: _________________________________ Date of purchase: ______________________________ Place of purchase: ______________________________ T A B L E O F C O N T E N T S Table of contents - 3 6 First things first Your guides ............................................. 6 Basic care and tips for using your computer.................................................. 6 Turning your computer off........................... 6 Taking care of your computer ..................... 7 Taking care of your AC adapter .................. 8 Cleaning and servicing................................ 8 Your Acer notebook tour 9 Screen view ............................................. 9 Keyboard view ....................................... 10 Left view ................................................ 11 Right view ....................................... 12 USB 3.1 Gen 1 information ....................... 12 USB Type-C information ........................... 13 Front view ............................................ 13 Base view .......................................... 14 Using the keyboard 15 Lock keys.............................................. 15 Hotkeys.................................................. 15 Windows keys ....................................... 16 Using the Precision Touchpad 17 Touchpad gestures................................ 17 Changing touchpad settings .................. 19 Recovery 20 Creating a factory default backup.......... 20 Backing up your wireless and LAN drivers.................................................... 22 Restoring your computer ....................... 22 Reset this PC and keep my files ............... 23 Reset this PC and remove everything ...... 24 Using a Bluetooth connection 27 Enabling and disabling Bluetooth .......... 27 Enable Bluetooth and add a device .......... 27 Connecting to the Internet 29 Connecting to a wireless network.......... 29 Connecting to a wireless LAN................... 29 Connecting with a cable ........................ 32 Built-in network feature ............................. 32 Connecting to a cellular network ........... 32 Near Field Communication 34 Bluelight Shield 35 Acer ProShield 37 Overview................................................ 37 Setting up Acer ProShield ..................... 37 Personal Secure Drive .............................. 39 Credential Manager ............................... 39 Data Protection...................................... 40 Data Removal........................................ 41 42 Securing your computer Using a computer security lock.............. 42 Using passwords ................................... 42 Entering passwords .................................. 43 Fingerprint Reader 44 How to use the fingerprint reader .......... 44 Face Recognition 49 How to use the Face Recognition.......... 49 BIOS utility 53 Boot sequence....................................... 53 Setting passwords ................................. 53 Power management 54 Saving power ......................................... 54 Battery pack 56 Battery characteristics ........................... 56 Charging the battery ................................. 56 Optimizing battery life ............................... 57 Checking the battery level......................... 58 Battery-low warning .................................. 58 Traveling with your computer 59 Disconnecting from the desktop ............ 59 Moving around ....................................... 59 Preparing the computer ............................ 59 What to bring to meetings ......................... 60 Taking the computer home .................... 60 Preparing the computer ............................ 60 What to take with you................................ 61 Special considerations .............................. 61 Setting up a home office ........................... 61 Traveling with the computer................... 62 Preparing the computer ............................ 62 What to take with you................................ 62 Special considerations .............................. 62 Traveling internationally......................... 62 Preparing the computer ............................ 63 What to bring with you .............................. 63 Special considerations .............................. 63 65 Universal Serial Bus (USB) USB Type-C port 66 Thunderbolt 3 port 67 Displays ................................................. 67 microSD card reader 68 69 Video and audio connectors Connecting a monitor............................. 69 Headphones and microphone................ 69 HDMI 70 Frequently asked questions 72 Requesting service ................................ 74 Tips and hints for using Windows 10 ..... 75 4 - Table of contents How do I get to Start? ............................... 75 How do I turn off my computer?................ 75 How do I unlock my computer?................. 75 How do I set the alarm? ............................ 77 Where are my apps?................................. 78 What is a Microsoft ID (account)?............. 78 How do I check for Windows updates?..... 79 Where can I get more information?........... 79 Troubleshooting..................................... 80 Troubleshooting tips.................................. 80 Error messages......................................... 80 Internet and online security 82 First steps on the net ............................. 82 Protecting your computer.......................... 82 Choose an Internet Service Provider ........ 82 Network connections................................. 84 Surf the Net!.............................................. 85 Internet security software.......................... 86 Getting started... In this section you will find:
Useful information on caring for your computer and your health Where to find the power button, ports and connectors Tips and tricks for using the touchpad and keyboard How to create recovery backups Guidelines for connecting to a network and using Bluetooth Information on using Acers bundled software 6 - First things first F I R S T T H I N G S F I R S T We would like to thank you for making this Acer notebook your choice for meeting your mobile computing needs. Your guides To help you use your Acer notebook, we have designed a set of guides:
First off, the Setup Guide helps you get started with setting up your computer. The Quick Guide introduces you to the basic features and functions of your new computer. For more on how your computer can help you to be more productive, please refer to the Users Manual. This guide contains detailed information on such subjects as system utilities, data recovery, expansion options and troubleshooting. Once you have connected to the internet, you can download updates for your computer from:
http://go.acer.com/?id=17883 1. The link will open the Acer Support webpage. 2. Scroll down to Drivers and Manuals and search for your model by pasting in or manually entering the serial number, SNID, or product model. 3. From this page you can also download and install the Acer identification utility that will automatically detect your computers serial number and SNID and allow you to copy it to the clipboard. 4. Once you have found your product model, any updates, or documents will be listed. Basic care and tips for using your computer Turning your computer off To turn the power off, do any of the following:
Use the Windows shutdown command: Press the Windows key or select the Windows Start button, select Power > Shut down. First things first - 7 Right-click the Windows Start button > Shut down or sign out >
Shut down. If you need to power down the computer for a short while, but dont want to completely shut it down, you can put it to Sleep by doing any of the following:
Press the power button. Press the sleep hotkey. Press the Windows key or select the Windows Start button, select Right-click the Windows Start button > Shut down or sign out >
Power > Sleep. Sleep. Note If you cannot power off the computer normally, press and hold the power button for up to ten seconds to shut down the computer. If you turn off the computer and want to turn it on again, wait at least two seconds before powering up. Taking care of your computer Your computer will serve you well if you take care of it. Only use the adapter provided with your device, or an Acer-
approved adapter to power your device. Do not expose the computer to direct sunlight. Do not place it near sources of heat, such as a radiator. Do not expose the computer to temperatures below 0 C (32 F) or above 50 C (122 F). Do not subject the computer to magnetic fields. Do not expose the computer to rain or moisture. Do not spill water or any liquid on the computer. Do not subject the computer to heavy shock or vibration. Do not expose the computer to dust or dirt. Never place objects on top of the computer. Do not slam the computer display when you close it. Never place the computer on uneven surfaces. 8 - First things first Taking care of your AC adapter Here are some ways to take care of your AC adapter:
Do not connect the adapter to any other device. Do not step on the power cord or place heavy objects on top of it. Route the power cord and any cables away from where people walk. When unplugging the power cord, do not pull on the cord itself but pull on the plug. The total ampere ratings of the equipment plugged in should not exceed the ampere rating of the cord if you are using an extension cord. Also, the total current rating of all equipment plugged into a single wall outlet should not exceed the fuse rating. Cleaning and servicing When cleaning the computer, follow these steps:
1. Turn off the computer. 2. Disconnect the AC adapter. 3. Use a soft, moist cloth. Do not use liquid or aerosol cleaners. If your computer is dropped or visibly damaged, or does not work normally, please contact your nearest authorized Acer service center. Y O U R A C E R N O T E B O O K T O U R Your Acer notebook tour - 9 After setting up your computer as illustrated in the Setup Guide, let us show you around your new Acer computer. Screen view Model A Note Illustrations are for reference only. Actual products specifications may vary. 1 2 3 4 5 1 2 6 5 Model B 10 - Your Acer notebook tour Icon Item Description Microphones 4 array microphones for far-field technology that allows users to access Cortana up to 4 meters away. Webcam shutter Slide the shutter to the right to cover the webcam. Slide left to open it. Webcam Infrared LED Screen with lay-
flat hinge Webcam Web camera for video communication, and detects Infrared signal for face authentication. A light next to the webcam indicates that the webcam is active. Emits Infrered light for the webcam and face authentication. Displays computer output. Web camera for video communication. A light next to the webcam indicates that the webcam is active.
1 2 3 4 5 6 Keyboard view 1 2 3 4 Your Acer notebook tour - 11 Icon Item Description Power button with fingerprint reader Keyboard Touchpad Press to turn the computer on and off. Touch lightly to use fingerprint reader for Windows Hello and security. For entering data into your computer. See "Using the keyboard" on page 15. Touch-sensitive pointing device. The touchpad and selection buttons form a single surface. Press down firmly on the touchpad surface to perform a left click. Press down firmly on the lower right corner to perform a right click. NFC transmitter Communicates with another NFC enabled device. 1 2 3 4 5 Icon Item Description DC-in jack Connects to an AC adapter. HDMI port Supports high-definition digital video connections. USB port Connects to USB devices.
1 2 3 4
1 2 3 Left view
4 5
1 2 3 4 5 12 - Your Acer notebook tour Icon Item Description USB Type-C with DC-in/
Thunderbolt 3 port Connects to the USB Type-C power adapter and to USB devices with a USB Type-C connector. Supports Thunderbolt 3 and displays. Headset/
speaker jack Connects to audio devices (e.g., speakers, headphones) or a headset with microphone. Right view 1 2 3 4 5 Icon Item Description SIM card slot
(Optional) microSD card reader Insert a Nano SIM card into the slot. Accepts one Secure Digital
(microSD) card. Only one card can operate at a time. USB port with power-off charging Connects to USB devices. Ethernet (RJ-45) port Connects to an Ethernet 10/100/
1000-based network. Pull the lip down to open the port fully. Kensington lock slot Connects to a Kensington-compatible security lock. USB 3.1 Gen 1 information USB 3.1 Gen 1 compatible ports are blue. Compatible with USB 3.1 Gen 1 and earlier devices. For optimal performance, use USB 3.1 Gen 1-certified devices. Defined by the USB 3.1 Gen 1 specification (SuperSpeed USB). Your Acer notebook tour - 13 USB Type-C information USB 3.1 Gen 1 with transfer speeds up to 5 Gbps. Supports DisplayPort audio/video output. Compatible with Thunderbolt 3. Delivers up to 3 A at 5 V DC for USB charging. DC-in: requires power adapter or power source providing 65 W at 12/18~20 V. For optimal performance, please use a certified Acer power adapter or USB Power Delivery device. Front view
1 2 1 2 Icon Item Description SC Smart Card reader (optional) Accepts one smart card. Only one smart card can be read at a time. Power indicator Indicates the computers power status. Battery indicator Indicates the computers battery status. Charging: The light shows amber when the battery is charging. Fully charged: The light shows blue when in AC mode. 14 - Your Acer notebook tour Base view 1 2
1 2 Icon Item Description Ventilation and cooling fan Allows the computer to stay cool. Do not cover or obstruct the openings. Battery reset pinhole Simulates removing and reinstalling the battery. Insert a paperclip into the hole and press for four seconds. U S I N G T H E K E Y B O A R D Using the keyboard - 15 The keyboard has full-sized keys, a numeric keypad, separate cursor, lock, Windows keys and hotkeys. Lock keys The keyboard has lock keys which you can use to turn keyboard functions on and off. Lock key Description Caps Lock When Caps Lock is on, all alphabetic characters typed are in uppercase. When Num Lock is on, the keypad is in numeric mode. The keys function as a calculator (complete with the arithmetic operators +, -, *, and /). Use this mode when you need to do a lot of numeric data entry. Num Lock Fn + F12 Hotkeys To activate hotkeys, press and hold the Fn key before pressing the other key in the hotkey combination. Hotkey Icon Function Description Fn + F1 Fn + F2 Fn + F3 Fn + F4 Sleep Flight mode Puts the computer in Sleep mode. Turns on / off the computer's network devices. Brightness down Decreases the screen brightness. Brightness up Increases the screen brightness. Switches display output between the display screen, external monitor (if connected) and both. Fn + F5 Display toggle 16 - Using the keyboard Hotkey Icon Function Description Fn + F6 Display off Turns the display screen backlight off to save power. Press any key to return. Turns the built-in touchpad on and off. Turns the keyboard backlight on and off. Touchpad toggle Keyboard backlight toggle Speaker toggle Turns the speakers on and off. Volume down Decreases the sound volume. Volume up Increases the sound volume. Fn + F7 Fn + F8 Fn + F9 Fn + F10 Fn + F11 Fn + F12 NumLk Numeric Lock Turns Numeric Lock on or off. Fn + Pg Up Home Home Fn + Pg Dn End End Scrolls to the beginning of a document. Scrolls to the end of a document. Windows keys The keyboard has two keys that perform Windows-specific functions. Key Description Windows key Application key Pressed alone it returns to the Start screen or to return to the last open app. This key has the same effect as clicking the right mouse button. U S I N G T H E P R E C I S I O N T O U C H P A D Using the Precision Touchpad - 17 The touchpad controls the arrow
(or 'cursor') on the screen. As you slide your finger across the touchpad, the cursor will follow this movement. The Precision Touchpad (PTP) is designed to provide a more uniform, smooth, and accurate touchpad experience. Many applications support precision touchpad gestures that use one or more fingers, however, some gestures may not be supported by the specific application or program you are using. Touchpad gestures Single-finger slide Slide a finger across the touchpad to move the cursor. Single-finger press or tap Press the touchpad down, or lightly tap the touchpad with your finger, to perform a 'click', which will select or start an item. Quickly repeat the tap to perform a double tap or
'double click'. Two-finger press Lightly tap the touchpad with two fingers to perform a
'right click'. In the Start screen, this will toggle the app commands. In most apps this will open a context menu related to the selected item. Two-finger slide Swiftly scroll through web pages, documents and playlists by placing two fingers on the touchpad and moving both in any direction. Two-finger pinch Zoom in and out of photos, maps and documents with a simple finger-and-thumb gesture. 18 - Using the Precision Touchpad Three-finger press Lightly tap the touchpad with three fingers to open the Search Windows. Three-finger swipe Swipe across the touchpad with three fingers. Swipe up to open Task View. Move the cursor over a window and tap the touchpad to select that window, or swipe downwards to exit Task View. Swipe down to minimize all open windows and show Desktop; swipe upwards to restore the minimized windows. Swipe left or right to switch between open windows. Four-finger press Lightly tap the touchpad with four fingers to open the Action Center. Four-finger swipe Swipe across the touchpad with four fingers. Swipe up to open Task View. Move the cursor over a window and tap the touchpad to select that window, or swipe downwards to exit Task View. Swipe down to minimize all open windows and show Desktop; swipe upwards to restore the minimized windows. The precision touchpad includes added technology features that help recognize and prevent unintentional gestures such as accidental taps, gestures, and pointer movement. Note The touchpad is sensitive to finger movement; the lighter the touch, the better the response. Please keep the touchpad and your fingers dry and clean. Using the Precision Touchpad - 19 Changing touchpad settings To change the touchpad settings to suit your personal requirements, please do the following. 1. In the icon tray in the lower right-hand corner of the screen, select the Notifications icon to open the Notifications pane. 2. Select All settings. 3. Select Devices > Touchpad 4. Now you can adjust the settings to suit your personal needs. You can switch off the touchpad if you prefer to use a mouse. Or you can adjust the touchpad sensitivity to suit your needs. Scroll down to see more settings. 20 - Recovery R E C O V E R Y If you are having trouble with your computer, and the frequently asked questions (see Got a question? on page 71) do not help, you can recover your computer. This section describes the recovery tools available on your computer. Acer provides Acer ControlCenter, which allows you to reset your PC, refresh your PC, or create a factory default backup. If you cannot access Acer ControlCenter, click Settings in the Start menu, select Update & Security and then click Recovery. Note Acer ControlCenter vary depending on model or Operating System. Important We recommend that you create a Factory Default Backup as soon as possible. In certain situations a full recovery will require a USB recovery backup. Creating a factory default backup Recovery Management allows you to quickly and easily back up your operating system, installed apps and data. Note Since the recovery backup requires at least 8 GB of storage after formatting, it is recommended to use a USB drive with a capacity of 16 GB or larger. 1. From Start, select Control Center then Recovery Management. 2. Select the Backup tab and click Get Started for Create Factory Default Backup to open the Recovery Drive window. Recovery - 21 3. Make sure Back up system files to the recovery drive is selected and click Next. 22 - Recovery 4. Plug in the USB drive and wait for the PC to detect the USB drive then click Next. 5. Everything on the drive will be deleted. Click Create to continue. 6. You will be shown the backup progress on the screen. 7. Follow the process until it completes. 8. Unplug the USB drive and label it clearly. Important Write a unique, descriptive label on the backup, such as 'Windows Recovery Backup'. Make sure you keep the backup in a safe place that you will remember. Backing up your wireless and LAN drivers Back up your wireless and LAN drivers. You can use these backups to install the wireless and LAN drivers if you install another operating system. 1. From Start, select Control Center then Recovery Management. 2. Select the Backup tab and click Get started for Backup wireless and LAN drivers. Choose a folder to save your drivers and select OK. Restoring your computer Recovery Management allows you to quickly and easily restore your computer back to its default status. You can choose to keep your files or remove them before reinstalling Windows. Reset this PC and keep my files 1. From Start, select Control Center then Recovery Management. 2. Select the Restore tab and click Get started to Choose an option. Recovery - 23 3. Select Keep my files to refresh your PC and reinstall your operating system without removing your personal files. Click Next to continue. Important If you have apps installed on your PC, they will be removed. 24 - Recovery 4. Resetting the PC will reinstall Windows, change settings back to their factory defaults and remove all preinstalled apps and programs without removing your personal files. Click Reset to continue. 5. You will be shown the reset progress on the screen. The screen will turn off during the reset process. 6. The screen will turn back on when it is installing Windows. Your PC will restart several times during the reset process. 7. Follow the process until it completes. 8. When your PC has completed the reset process, Windows will have been reset back to its factory default settings without removing your personal files. Reset this PC and remove everything 1. From Start, select Control Center then Recovery Management. 2. Select the Restore tab and click Get Started to Choose an option. 3. Select Remove everything to reset your PC back to its factory default. This process will reinstall your operating system and remove all of your personal files, apps, and settings. Recovery - 25 4. Select Just remove my files if you are keeping your computer. This will be quicker, but less secure. Files may still be recovered with a file recovery program. Select Remove files and clean the drive if you are not keeping your computer. This process will take longer, but will be more secure. Warning Selecting "Remove files and clean the drive" will remove all of your personal files and accounts, along with pre-existing drivers that may affect your Windows installation. 26 - Recovery 5. Click Reset to continue. 6. You will be shown the reset progress on the screen. The screen will turn off during the reset process. 7. The screen will turn back on when it is installing Windows. Your PC will restart several times during the reset process. 8. Follow the process until it completes. 9. When your PC has completed the reset process, Windows will use factory default settings. U S I N G A B L U E T O O T H C O N N E C T I O N Using a Bluetooth connection - 27 Bluetooth is a technology enabling you to transfer data wirelessly over short distances between many different types of devices. Bluetooth-
enabled devices include computers, cell phones, tablets, wireless headsets, and keyboards. To use Bluetooth, you must ensure the following:
1. Bluetooth is enabled on both devices. 2. Your devices are "paired" (or connected). Enabling and disabling Bluetooth The Bluetooth adapter must be enabled on both devices. For your computer, this may be an external switch, a software setting, or a separate Bluetooth dongle plugged into the computers USB port (if no internal Bluetooth adapter is available). Note Please check your devices owners manual to determine how to turn on its Bluetooth adapter. Enable Bluetooth and add a device Every new device must first be "paired" with your computers Bluetooth adapter. This means it must first be authenticated for security purposes. You only need to pair once. After that, simply turning on the Bluetooth adapter of both devices will connect them. Bluetooth on your computer is disabled by default. To enable your computers Bluetooth adapter, do the following:
1. Press the Windows key or select the Windows Start button >
Settings > Devices > Bluetooth & other devices , and click the toggle under Bluetooth to enable/disable it. 2. Click on Add Bluetooth or other device then select the device that you want to add. 3. Your computer will automatically start searching for devices, as well as make itself visible to other devices. 28 - Using a Bluetooth connection devices. 4. Select the device you wish to pair from the list of discovered 5. After pairing, if there is a code displaying on the screen, enter that code on the device to proceed the connection. Note Some devices using older versions of the Bluetooth technology require both devices to enter a PIN. In the case of one of the devices not having any inputs
(as in a headset), the passcode is hardcoded into the device (usually "0000"
or "1234"). Consult your devices user manual for more information. the Bluetooth settings by selecting You can also enter the Notifications icon in the lower right-hand corner of the screen to open the Notifications pane. From here, you can enable or disable Bluetooth or right-click on Bluetooth > Go to Settings to enter the Bluetooth settings. C O N N E C T I N G T O TH E I N T E R N E T Connecting to the Internet - 29 This chapter includes general information on types of connections, and getting connected to the internet. For detailed information, please refer to Network connections on page 84. Your computers built-in network features make it easy for you to connect your computer to the internet. First though, in order to connect to the internet from home, youll need to sign up for internet services from an ISP (Internet Service Provider)
-- usually a phone or cable company -- that will have to go to your home or office to set up internet service. The ISP will install a small box, a router or modem, that will allow you to connect to the internet. Connecting to a wireless network Connecting to a wireless LAN A wireless LAN (or WLAN) is a wireless local area network, which can link two or more computers without using wires. Once connected to WLAN, you can access the internet. You can also share files, other devices, and even your internet connection itself. Your computer's wireless connection is turned on by default and Windows will detect and display a list of available networks during setup. Select your network and enter the password if required. Warning Using wireless devices while flying in aircraft may be prohibited. All wireless devices must be switched off before boarding an aircraft and during take-off, as they may be dangerous to the operation of the aircraft, disrupt communications, and even be illegal. You may turn on your computers wireless devices only when informed that it is safe to do so by the cabin crew. Acer notebook computers feature a Flight mode hotkey that turns the network connection on or off. You can use the network management options to turn your wireless network on/off or control what is shared over the network. 30 - Connecting to the Internet To connect to a wireless network, please follow the steps below. 1. Ensure you have a wireless router/access point and current internet connection through the ISP of your choice. Make a note of the wireless networks name and password (if necessary). If you are trying to connect to a public network (such as at a coffeeshop), make sure you have the wireless networks name. Note Please refer to your ISP or router documentation for details on connecting to the internet. 2. Click Network icon in the notification area. Note If Wi-Fi is turned off, please click Wi-Fi tile to turn it on. 3. You will see a list of available wireless networks. Select the one you wish to use. 4. Once you select a wireless network, select Connect. Connecting to the Internet - 31 5. If required, enter the networks password. 32 - Connecting to the Internet Connecting with a cable Built-in network feature If your computer has a network port, plug one end of a network cable into the network port on your computer, and the other end into a port on your router (refer to the image below.) Then, you'll be ready to get online. Connecting to a cellular network If your computer has a SIM slot, you can connect to the internet using a cellular phone network. Note You must have a compatible SIM card and a data contract with your cellular provider. Contact your cellular provider for more information on connecting to the internet using a cellular network. Cellular Data will be turned on when a SIM card is inserted and detected. If is not, follow these steps:
1. Press the Windows key or select the Windows Start button, click Settings in the Start menu. 2. Select the Network & Internet to continue. 3. Select Mobile on the left, then click Connect. Connecting to the Internet - 33 4. Click Network icon in the notification area to ensure your connection with a data plan. 34 - Near Field Communication N E A R F IE LD C O M M U N I C A T I O N F r e qu e nt ly a sk Near Field Communication (NFC) enables your computer to wirelessly communicate with other NFC devices across a short distance. Both devices must have NFC enabled. An NFC transmitter is located on the top-right corner of touchpad on your computer. To use the NFC, do the following:
1. Press the Windows key or select the Windows Start button, click Settings in the Start menu. 2. Select the Network & Internet to continue. 3. Select Flight mode on the left, click the toggle under NFC to enable it. 4. Make sure NFC is enabled if the other device is a smartphone, and bring the NFC transmitters on both devices together. 5. Follow the instructions on the screen. B L U E L I G H T S H I E L D Bluelight Shield - 35 The Bluelight Shield can be enabled to reduce blue-light emissions from the screen to protect your eyes. To configure the Bluelight Shield, search for Quick Access in the Start Menu. From here you can toggle Bluelight Shield on or off, and you can choose from four different modes to fit your needs:
No. Item Description 1 2 3 4 Low Reduction Medium Reduction High Reduction Reduces blue light emission from the LED backlit screen by 10% to 25% for basic protection. Reduces blue light emission from the LED backlit screen by 26% to 45% to protect your eyes. Reduces blue light emission from the LED backlit screen by 46% to 65% for maximum protection. Long Hour Mode Professionally tuned to reduce eye strain over an extended period of time. Note Specifications vary depending on model or Operating System. Keeping your computer and data safe... In this section you will find:
How to secure your computer Setting passwords What you need to prepare when youre traveling How to get the most out of your battery A C E R P R OS H I E L D Acer ProShield - 37 Overview An all-in-one security solution, Acer ProShield provides an embedded security solution to address the following points of vulnerability:
Securing the device against unauthorized access Protecting local storage Securing the network Acer ProShield includes four modules that will secure your device from unauthorized access and intrusion. Note Your computer may not have all the modules mentioned below. Please refer to your computers specifications to confirm which modules are supported. Credential Manager - Password, Backup and Restore. Data Protection - Personal secure drive, file and folder encryption. Data Removal - File shredder. Information - About this software. Setting up Acer ProShield The first time you run Acer ProShield, you will be led through a setup wizard that allows you to set up the parameters for Acer ProShield. 38 - Acer ProShield Click Start to begin. You will be required to set a password, and can choose to create a Personal Secure Drive. Note Select a password that you will remember, but is difficult to guess. Do not use words that can be found in a dictionary. It is advisable to use a combination of letters and numbers. Once you have set a password, you can click Next to proceed to setting up a Personal Secure Drive or click Finish to exit the wizard. Personal Secure Drive The Personal Secure Disk (PSD) is a secure section of your hard disk where you can save files. You can only get access to the PSD via password or fingerprint authentication. Acer ProShield - 39 Once setup is finished, you can go to the ProShield Console to manage your computer or make changes to the settings. Use the menu in the left-hand pane to make changes. Credential Manager Here you can set and manage your ProShield password. 40 - Acer ProShield You can change your ProShield passwords, back up or restore credential information. Data Protection Here you can select files for encryption or decryption, and manage your Personal Secure Drive. Data Removal Here you can select files to be completely removed from the hard disk. The File Shredder overwrites the data to make recovering the data impossible. Acer ProShield - 41 Warning Make sure you select only the information you want to shred. Once you have shredded a file or folder, it is impossible to recover the data. 42 - Securing your computer S E C U R I N G Y O U R C O MP U TE R Your computer is a valuable investment that you need to take care of. Learn how to protect and take care of your computer. Security features include hardware and software locks a security notch and passwords. Using a computer security lock The computer comes with a computer security slot for a security lock. Wrap a computer security lock cable around an immovable object such as a table or handle of a locked drawer. Insert the lock into the notch and turn the key to secure the lock. Some keyless models are also available. Using passwords Passwords protect your computer from unauthorized access. Setting these passwords creates several different levels of protection for your computer and data:
Supervisor Password prevents unauthorized entry into the BIOS utility. Once set, you must enter this password to gain access to the BIOS utility. See Setting passwords on page 53. User Password secures your computer against unauthorized use. Combine the use of this password with password checkpoints on boot-up and resume from Hibernation (if available) for maximum security. Password on Boot secures your computer against unauthorized use. Combine the use of this password with password checkpoints on boot-up and resume from Hibernation (if available) for maximum security. Important Do not forget your Supervisor Password! If you forget your password, please get in touch with your dealer or an authorized service center. Entering passwords Securing your computer - 43 When a password is set, a password prompt appears in the center of the display screen. When the Supervisor Password is set, a prompt appears when you enter the BIOS utility. Type the Supervisor Password and press Enter to access the BIOS utility. If you enter the password incorrectly, a warning message appears. Try again and press Enter. When the User Password is set and the password on boot parameter is enabled, a prompt appears at boot-up. Type the User Password and press Enter to use the computer. If you enter the password incorrectly, a warning message appears. Try again and press Enter. Important You have three chances to enter a password. If you fail to enter the password correctly after three tries, the system halts. Press and hold the power button for four seconds to shut down the computer. Then turn on the computer again, and try again. 44 - Fingerprint Reader F I N G E R P R I N T R E A D E R In addition to using an account password or PIN to sign in to Windows apps and services, you can also use the fingerprint reader to sign-in and unlock your Acer notebook. In order to use the fingerprint reader, you must first configure the fingerprint reader to recognize your fingerprint to confirm your identity. How to use the fingerprint reader Select the Start button, then select Settings > Accounts > Sign-in options to set up Windows Hello. 1. Set a password. 2. Set a PIN code. Fingerprint Reader - 45 3. In Windows Hello Fingerprint, select Set up to configure the fingerprint reader. 46 - Fingerprint Reader 4. In the Windows Hello set up window, select Get started to begin the fingerprint configuration. 5. Enter your PIN to confirm your identity. 6. When the Windows Hello setup window appears, follow the onscreen directions. Press and hold your finger on the fingerprint sensor and fingerprint configuration is complete. this step until lift. Repeat then the Fingerprint Reader - 47 48 - Fingerprint Reader 7. Once the fingerprint configuration is complete, you will be able to sign in or unlock your computer by placing your fingerprint on the fingerprint reader. You may select Add another finger to add another fingerprint to unlock the computer. Note If the notebook has multiple accounts, you can set up access separately and automatically switch between accounts. F A C E R E C O G N I T I O N Face Recognition - 49 If your computer is equipped with an IR LED, it will works with the camera and the Windows Hello Face Recognition to provide a more secure and personal way for you to access your computer. In order to use the Face Recognition function, you must first configure the it to recognize your face to confirm your identity. How to use the Face Recognition Select the Start button, then select Settings > Accounts > Sign-in options to set up Windows Hello. 1. Set a password. 50 - Face Recognition 2. Set a PIN code. 3. In Windows Hello, select Set up to configure the Face Recognition. 4. In the Windows Hello set up window, select Get started to begin the Face Recognition configuration. Face Recognition - 51 5. Enter your PIN to confirm your identity. 6. When the Windows Hello setup window appears, look directly at the camera and keep your face in the frame. Wait for the process to be complete. 52 - Face Recognition 7. Once the face recognition configuration is complete, you will be able to sign in or unlock your computer with your face. Note Please click Improve Recognition to improve the recognized images so that Windows Hello can recognize your face in different lighting and if your appearance changes, such as with or without glasses on. B I O S U T I L I T Y BIOS utility - 53 The BIOS utility is a hardware configuration program built into your computer's BIOS. Your computer is already properly configured and optimized, and you do not normally need to run this utility. However, if you encounter configuration problems, you may need to run it. To activate the BIOS utility, press F2 while the computer logo is being displayed. Boot sequence Setting passwords To set the boot sequence in the BIOS utility, activate the BIOS utility, then select Boot from the categories listed on the top of the screen. To set a password on boot, activate the BIOS utility, then select Security from the categories listed on the top of the screen. Find Set Supervisor Password and enter a password to enable this feature. Once you have entered a password for this feature, you may then enable/disable Password on Boot. Remember to select F10 to properly save and exit the BIOS utility when you are done making changes. 54 - Power management P O W E R M A N A G E M E N T This computer has a built-in power management unit that monitors system activity. System activity refers to any activity involving one or more of following devices: keyboard, mouse, hard disk, peripherals connected to the computer, and video memory. If no activity is detected for a period of time, the computer stops some or all of these devices in order to conserve energy. the Saving power Disable Fast startup Your computer uses Fast startup to start quickly, but also uses a small amount of power to check for signals to start. These checks will slowly drain your computers battery. If you prefer to reduce your computers power requirements and environmental impact, turn off Fast startup:
Note If Fast startup is off, your computer will take longer to start from Sleep. Your computer will also not start if it receives an instruction to start over a network (Wake on LAN). 1. Press the Windows key or select the Windows Start button then select Settings > System > Power & sleep. 2. Select Additional power settings. 3. Select Choose what the power buttons do. 4. Select Change settings that are currently unavailable. Power management - 55 5. Scroll down and disable Turn on fast startup. 6. Select Save changes. 56 - Battery pack B A T T E R Y P A C K The computer uses an embedded Lithium battery that gives you long use between charges. Battery characteristics The battery is recharged whenever you connect the computer to the AC adapter. Your computer supports charge-in-use, enabling you to recharge the battery while you continue to operate the computer. However, recharging with the computer turned off significantly reduces charge time. The battery will come in handy when you travel or during a power failure. Charging the battery Plug the AC adapter into the computer, and connect to a mains power outlet. Note You are advised to charge the battery before retiring for the day. Charging the battery overnight before traveling enables you to start the next day with a fully charged battery. Conditioning a new battery pack Before you use a battery pack for the first time, there is a conditioning process that you should follow:
1. Connect the AC adapter and fully charge the battery. 2. Turn on the computer and complete setting up the operating system. 3. Disconnect the AC adapter. 4. Operate the computer using battery power. 5. Fully deplete the battery until the battery-low warning appears. 6. Reconnect the AC adapter and fully charge the battery again. Follow these steps again until the battery has been charged and discharged three times. Battery pack - 57 Use this conditioning process for all new batteries, or if a battery hasn't been used for a long time. Warning Do not expose battery packs to temperatures below 0 C (32 F) or above 45 C (113 F). Extreme temperatures may adversely affect the battery pack. The battery conditioning process ensures your battery accepts the maximum possible charge. Failure to follow this procedure will prevent you from obtaining the maximum battery charge, and will also shorten the effective lifespan of the battery. In addition, the useful lifespan of the battery is adversely affected by the following usage patterns:
Using the computer on constant AC power. Not discharging and recharging the battery to its extremes, as described above. Frequent use; the more you use the battery, the faster it will reach the end of its effective life. An embedded battery has a life span of more than 1,000 charge/discharge cycles. Optimizing battery life Optimizing battery life helps you get the most out of battery operation, prolonging the charge/recharge cycle and improving recharging efficiency. You are advised to follow the suggestions set out below:
Use AC power whenever possible, reserving battery for mobile use. Remove accessories that are not being used (e.g. a USB disk drive), as they can continue to draw power. Store your PC in a cool, dry place. The recommended temperature is 10 C (50 F) to 30 C (86 F). Higher temperatures cause the battery to self-discharge faster. Excessive recharging decreases the battery life. Look after your AC adapter and battery. 58 - Battery pack Checking the battery level The power meter indicates the current battery level. Rest the cursor over the battery/power icon on the taskbar to see the battery's present charge level. Battery-low warning When using battery power pay attention to the power meter. Important Connect the AC adapter as soon as possible after the battery-low warning appears. Data may be lost if the battery is allowed to become fully depleted and the computer shuts down. When the battery-low warning appears, the recommended course of action depends on your situation:
Situation Recommended Action The AC adapter and a power outlet are available. 1. Plug the AC adapter into the computer, and then connect to the main power supply. 2. Save all necessary files. 3. Resume work. Turn off the computer if you want to recharge the battery rapidly. The AC adapter or a power outlet is unavailable. 1. Save all necessary files. 2. Close all applications. 3. Turn off the computer. T R A V E L I N G W I T H Y O U R C O M P U T E R Traveling with your computer - 59 This section gives you tips and hints to consider when moving around or traveling with your computer. Disconnecting from the desktop Follow these steps to disconnect your computer from external accessories:
1. Save any open files. 2. Remove discs from optical drive. 3. Shut down the computer or put it into Sleep or Hibernate mode. 4. Close the display cover. 5. Disconnect the cord from the AC adapter. 6. Disconnect the keyboard, pointing device, printer, external monitor and other external devices. 7. Disconnect the Kensington / Noble lock if you are using one to secure the computer. Moving around Preparing the computer When you are just moving within short distances, for example, from your office desk to a meeting room. Before moving the computer, close and latch the display cover to place it in Sleep mode. You can now safely take the computer anywhere you go within the building. To wake the computer from Sleep mode, open the display and, if necessary, press and release the power button. If you are taking the computer to a client's office or a different building, you may choose to shut down the computer:
Press the Windows key, click Power then select Shut Down Or:
60 - Traveling with your computer You can put the computer in Sleep mode by pressing the Sleep hotkey or by closing the display. When you are ready to use the computer again, open the display and, if necessary, press and release the power button. Note The computer may enter Hibernation or Deep Sleep mode after being in Sleep mode for a period of time. What to bring to meetings If your meeting is relatively short, you probably do not need to bring anything with you other than your computer. If your meeting will be longer, or if your battery is not fully charged, you may want to bring the AC adapter with you to plug in your computer in the meeting room. If the meeting room does not have an electrical outlet, reduce the drain on the battery by putting the computer in Sleep mode. Press the Sleep hotkey or close the display cover whenever you are not actively using the computer. Taking the computer home When you are moving from your office to your home or vice versa. Preparing the computer After disconnecting the computer from your desktop, follow these steps to prepare the computer for the trip home:
Check that you have removed all media and compact discs from the drive(s). Failure to remove the media can damage the drive head. Pack the computer in a protective case that can prevent the computer from sliding around and cushion it if it should fall. Warning Avoid packing items next to the top cover of the computer. Pressure against the top cover can damage the screen. Traveling with your computer - 61 What to take with you Unless you have some items at home, take the following items with you:
AC adapter and power cord. The printed Setup Guide. Special considerations Follow these guidelines to protect your computer while traveling to and from work:
Minimize the effects of temperature changes by keeping the computer with you. If you need to stop for an extended period of time and cannot carry the computer with you, leave the computer in the trunk of the car to avoid exposing the computer to excessive heat. Changes in temperature and humidity can cause condensation. Allow the computer to return to room temperature, and inspect the screen for condensation before turning on the computer. If the temperature change is greater than 10 C (18 F), allow the computer to come to room temperature slowly. If possible, leave the computer for 30 minutes in an environment with a temperature between outside and room temperature. Setting up a home office If you frequently work on your computer at home, you may want to purchase a second AC adapter for use at home. With a second AC adapter, you can avoid carrying the extra weight to and from home. If you use your computer at home for significant periods of time, you might also want to add an external keyboard, monitor or mouse. 62 - Traveling with your computer Traveling with the computer Important Check with your airline for any special requirements for travelling with Lithium batteries. When you are moving within a larger distance, for instance, from your office building to a client's office building or traveling locally. Preparing the computer Prepare the computer as if you were taking it home. Make sure that the battery in the computer is charged. Airport security may require you to turn on your computer when carrying it into the gate area. What to take with you Take the following items with you:
AC adapter Additional printer driver files if you plan to use another printer Special considerations In addition to the guidelines for taking the computer home, follow these guidelines to protect your computer while traveling:
Always take the computer as carry-on luggage. If possible, have the computer inspected by hand. Airport security X-
ray machines are safe, but do not put the computer through a metal detector. Traveling internationally Important Check with your airline for any special requirements for travelling with Lithium batteries. When you are moving from country to country. Traveling with your computer - 63 Preparing the computer What to bring with you Prepare the computer as you would normally prepare it for traveling. Bring the following items with you:
AC adapter. Power cords that are appropriate for your destination(s). Additional printer driver files if you plan to use another printer. Proof of purchase, in case you need to show it to customs officials. International Travelers Warranty passport. Special considerations Follow the same special considerations as when traveling with the computer. In addition, these tips are useful when traveling internationally:
When traveling in another country, check that the local AC voltage and the AC adapter power cord specifications are compatible. If not, purchase a power cord that is compatible with the local AC voltage. Do not use converter kits sold for appliances to power the computer. If you are using the modem, check if the modem and connector are compatible with the telecommunications system of the country you are traveling in. Ports and connectors... In this section you will find:
Information on the ports and connectors fitted to your computer U N I V E R S A L S E R I A L B U S ( U S B ) Universal Serial Bus (USB) - 65 The USB port is a high-speed port which allows you to connect USB peripherals, such as a mouse, an external keyboard, additional storage (external hard disks), or any other compatible device. Note Two USB standards are currently available on Acer computers: USB 2.0
(High-speed USB) and USB 3.1 Gen 1 (SuperSpeed USB). USB 2.0 ports on Acer computers have a black tongue in the port, while USB 3.1 Gen 1 ports have a blue tongue. For best performance, USB 3.1 Gen 1 devices should always be plugged into USB 3.1 Gen 1 ports. Consult your devices documentation to see which standard it supports. You can also charge devices such as tablets, smartphones, or other devices through a USB port. Some USB 3.1 Gen 1 ports support charging devices when the computer is in Hibernate or turned off. Additionally, you can use a USB hub to connect multiple devices to a single USB port. Important When removing a USB storage device, you should right-click on the USB icon in the Windows task bar and select "Eject <device>" to tell the operating system to stop using the device before removing it. Failure to do this may result in data loss or damage to your peripheral. 66 - USB Type-C port U S B T YPE- C P O R T A USB Type-C port is a connector that allows you to easily connect USB Type-C peripherals, such as additional storage (e.g. an external drive), or any other compatible device. The Type-C port is reversable; connectors may be inserted with either side up. Note On Acer computers USB Type-C ports support up to USB 3.1 (SuperSpeed USB, 5 Gbps). Other USB devices with a USB Type-C connector are supported, but transfer speed may be reduced and certain functions will be disabled (such as Thunderbolt video support). Important When removing a USB storage device, you should right-click on the USB icon in the Windows task bar and select "Eject <device>" to tell the operating system to stop using the device before removing it. Failure to do this may result in data loss or damage to your peripheral. T H U N D E R B O L T 3 P O R T Thunderbolt 3 port - 67 A Thunderbolt 3 port allows you to easily connect devices with a Type-C connector to your computer, such as additional storage
(e.g. an external drive), displays, or any other compatible device. Up to six devices, including displays, can be connected in series to a single Thunderbolt port. The Thunderbolt connection uses a USB Type-C port and is compatible with Thunderbolt, USB, DisplayPort and power on USB-C devices. The Type-C port is reversable; connectors may be inserted with either side up. Displays Up to two 4K displays with can be connected to a single Thunderbolt 3 port. If an adapter is used, DisplayPort or compatible devices, including HDMI, DVI or VGA, can be used. Note Thunderbolt 3 ports support transfer speeds up to 40 Gbps, and USB devices with a Type-C connector at lower speeds (typically up to 5 Gbps). Other USB or older Thunderbolt devices with a USB Type-C connector (or adapter) are supported, but transfer speeds may be reduced and certain functions may be disabled (such as Thunderbolt display support). Important When removing a USB storage device, you should right-click on the USB icon in the Windows task bar and select "Eject <device>" to tell the operating system to stop using the device before removing it. Failure to do this may result in data loss or damage to your peripheral. 68 - microSD card reader M I C R OSD C A R D R E A D E R microSD (Secure Digital) cards are used in a wide selection of digital cameras, tablets, media players and cellular phones. Inserting an microSD card connectors facing down. 1. Align the card so that the connector points towards the port, with the 2. Carefully slide the card into the port. If you find you need to use any force to insert the card, try reorientating the card slightly. 3. Push the card until it clicks into place. A few millimetres of the card will extend from beyond the slot. If the card contains some files, the Windows AutoPlay window may appear (this depends on the contents of the card) and ask you if you wish to use a program to access the contents of the card. Important When removing an microSD card, you should right-click on the USB icon in the Windows task bar and select "Eject <card name>" to tell the operating system to stop using the device before removing it. Failure to do this may result in data loss or damage to your peripheral. SD, SDHC and SDXC cards Different types of SD cards cover different capacities, while using the same overall design. SD cards contain up to 4 GB; SDHC cards contain up to 32 GB; and SDXC cards can contain up to 2048 GB
(2 TB). Your computer provides an SDHC or SDXC compatible card reader. Note SDXC memory cards can only be used in an SDXC-compatible reader; SD and SDHC cards can be used in either type. V I D E O A N D A U D I O C O N N E C T O R S Video and audio connectors - 69 Add an external monitor to your computer via a video port. The type of port available depends on your computers configuration. Connecting a monitor 1. Check that the computer is powered off and the monitor power switch is turned off. 2. Attach the video cable to the monitor port on the computer. 3. Connect the monitor power cable and plug it into a properly grounded wall outlet. 4. Follow any setup instructions in the monitor's user's guide. 5. Turn on power to the monitor, then the computer. 6. The correct resolution and refresh rate should be detected automatically. If necessary, change the display settings used by the computer. Note To access the display controls, right-click anywhere on the desktop and select Display settings. Headphones and microphone One or more 3.5 mm jacks on your computer allow you to connect audio devices. Use the headphone port to plug in stereo headphones or powered speakers; connecting an audio device to the headphone port disables the built-in speakers. Use the microphone port to connect an external microphone;
connecting a microphone disables the built-in microphone. Note Some computers have a single "combo" port that allows you to use single-pin headsets with a built-in microphone. These headsets are most commonly used with smartphones. 70 - HDMI H D M I HDMI (High-Definition Multimedia Interface) is a high-quality, digital audio/video interface. HDMI allows you to connect any compatible digital audio/video source, such as your computer, a set-top box, DVD player, and audio/video receiver to any compatible digital audio and/or video monitor, such as a digital television (DTV) with a single cable. The single cable keeps everything neat and tidy while ensuring easy connection and the best audio and visual quality. Got a question?
In this section you will find:
Frequently asked questions Tips for using Windows 10 Troubleshooting information How to protect yourself while online Where to find Acer service center contact information 72 - Frequently asked questions F R E Q U E N TL Y A S K E D Q U E S T I O N S The following is a list of possible situations that may arise during the use of your computer. Easy solutions are provided for each one. I turned on the power, but the computer does not start or boot up. Check if power is being supplied to the computer (if your computer has a power indicator, it will be off); if there is no power, check the following:
If you are using on the battery, it may be low and unable to power the computer. Connect the AC adapter to recharge the battery pack. You may need to wait a few minutes before trying to turn your computer on again. Make sure that the AC adapter is properly plugged into the computer and to the power outlet. If power is being supplied to the computer, check the following:
Do you have a USB storage device (USB drive, CD drive or smartphone) plugged into your computer? Unplug it and press Ctrl
+ Alt + Del to restart the system. Nothing appears on the screen. The computers power management system automatically blanks the screen to save power. Press any key to turn the display back on. If pressing a key does not turn the display back on, three things might be the cause:
The brightness level might be too low. Use the Brightness up hotkey to adjust the brightness level. The display device might be set to an external monitor. Press the display toggle hotkey to toggle the display back to the computer. The computer may be in Sleep or Hibernate mode (if there is a power LED, it will flash). Press and release the power button to resume. No audio is heard from the computer. Check the following:
The volume may be muted. Look at the volume control (speaker) Frequently asked questions - 73 icon in the taskbar. If it is crossed-out, click the icon and drag the slider to the right to increase the volume. The volume level may be too low. Check the volume from the volume control (speaker) icon in the taskbar. You can also use the volume control hotkeys to adjust the volume. If headphones, earphones or external speakers are connected to the headphone jack on the computer, the internal speakers automatically turn off. The keyboard does not respond. Try attaching an external keyboard to a USB port on the computer. If it works, contact your dealer or an authorized service center as the internal keyboard cable may be loose. The printer does not work. is turned on. Make sure that the printer is connected to a power outlet and that it Make sure that the printer cable is connected securely to a USB port and the corresponding port on the printer. I want to restore my computer to its original settings. Note If your system is the multilingual version, the operating system and language you choose when you first turn on the system will be the only option for future recovery operations. This recovery process helps you restore the C: drive with the original software content that is installed when you purchased your computer. Warning Your C: drive will be reformatted and all data will be erased. It is important to back up all data files before using this option. Before performing a restore operation, please check the BIOS settings. 1. If there is a D2D Recovery setting in Main, make sure it is Enabled. 2. Exit the BIOS utility and save changes. The system will reboot. 74 - Frequently asked questions Note To access the BIOS utility, press F2 when you see the Acer logo during boot up. For more information, see Restoring your computer on page 22. Requesting service International Travelers Warranty (ITW) Your computer is backed by an International Travelers Warranty
(ITW) that gives you security and peace of mind when traveling. An ITW passport came with your computer and contains all you need to know about the ITW program. A list of available, authorized service centers is in this handy booklet. Read this passport thoroughly. Always have your ITW passport on hand, especially when you travel, to receive the benefits from our support centers. Attach your proof-of-
purchase to the ITW passport. If the country you are traveling in does not have an Acer-authorized ITW service site, you can still get in contact with our offices worldwide. Please visit www.acer.com. Before you call Please have the following information available when you call Acer for online service, and please be at your computer when you call. With your support, we can reduce the amount of time a call takes and help solve your problems efficiently. If there are error messages or beeps reported by your computer, write them down as they appear on the screen (or the number and sequence in the case of beeps). You are required to provide the following information:
Name:
Address:
Telephone number:
Machine and model type:
Serial number:
Date of purchase:
F r e qu e nt ly a sk Frequently asked questions - 75 Tips and hints for using Windows 10 We know this is a new operating system that will take some getting used to, so we've created a few pointers to help you get started. How do I get to Start?
Press the Windows key or select the Windows Start button on the lower left-hand corner of the screen. Selecting it will open Start where you can launch apps. How do I see all of my apps?
Press the Windows key or select the Windows Start button to show a list of installed apps on the computer. How do I turn off my computer?
Press the Windows key or select the Windows Start button and select the power icon > Shut down. You can also turn off the computer by right-clicking the Windows Start button > Shut down or sign out >
Shut down. Can I turn off notifications?
You can turn off notifications so that you can leave your computer running, but not be disturbed by notifications. Press the Windows key or select the Windows Start button and select Settings > System > Notifications & actions. From here you can enable/disable notifications for all of your apps or choose which apps to enable/disable. How do I unlock my computer?
Press the space bar and select a user account icon to unlock the computer. If your account has a password set, you will need to enter the password to continue. 76 - Frequently asked questions Can I personalize the Lock screen?
You can personalize the lock screen with a different image, to run a slideshow of images, or to show you quick status and notifications to suit your personal needs. To change the background, press the Windows key or select the Windows Start button and select Settings > Personalization > Lock screen. From here you can:
Select a background image for the lock screen Turn the Slideshow on or off Select lock screen apps. How do I set up the lock screen slideshow?
1. Press the Windows key or select the Windows Start button and select Settings > Personalization. 2. Under Lock screen, select Slideshow. 3. Select Add a folder and open the folder you wish to use (your Pictures folder will open by default). Select Choose this folder to add the folder to the lock screen slideshow. 4. Select a folder and select Remove to remove the folder from the lock screen slideshow. 5. Change the other settings to suit your needs. How do I move tiles?
Select a tile and drag it to the place on Start that you want it to appear. Other tiles will be moved to accommodate the tile in its new location. Can I arrange tiles in groups?
Yes, you can. Select an existing tile and drag the tile to arrange Start to your liking. Right-click on an app and select Pin to Start to create a new group on Start. From here, you can drag the tile to an existing group on Start. You can give the group(s) a name and arrange the tiles within the groups to suit your needs. Can I make tiles bigger or smaller?
Yes, you can. Right-click on a tile and select Resize. Select a size from the menu that appears. Frequently asked questions - 77 Can I change the screen resolution?
Yes, you can. Move your cursor to the lower left-hand corner of the screen and type 'Resolution' in the text box to display the results; select Change the resolution of the display. Alternatively, you can also right-click anywhere on the desktop and select Display settings >
Display. How do I set the alarm?
Your computer can act as an alarm clock. Type Alarms to search for the Alarms & Clock app. 1. Select an alarm from the list, or select the + in the lower-right corner to create a new alarm. 2. Enter the Alarm name. 3. Set the time by choosing the hour and minute. 4. Choose which days the alarm should go off. 5. Select the sound notification. 6. Select the snooze time. 7. Select the Save icon in the bottom right-hand corner to save the alarm. 8. Select On or Off to activate or deactivate the alarm. Hour Minutes Save Delete 78 - Frequently asked questions Note The alarm will only sound if your computer is awake at the set time. Where are my apps?
Move your cursor to the lower left-hand corner of the screen and click search box, start typing the name of the app you would like to open. How do I make an app appear on Start?
If you're in all apps list and you want to make an app appear on Start, right-click an app and select Pin to Start. How do I remove a tile from Start?
Right-click a tile to select it and select Unpin from Start to remove the tile from Start. How do I make an app appear on my taskbar?
If you're in all apps list and you want to make an app appear on the taskbar, right-click an app or tile and select More > Pin to taskbar. How do I install apps?
You will need to have a Microsoft ID to purchase and download apps from Microsoft Store. I can't find apps like Notepad and Paint! Where are they?
Move your cursor to the lower left-hand corner of the screen and click search box. Type the name of the app you would like to open. Alternatively, open all apps list and scroll to Windows Accessories to see the list of legacy programs. What is a Microsoft ID (account)?
A Microsoft account is an email address and password that you use to sign in to Windows. You can use any email address, but it is best if you choose the one you already use to communicate with friends and sign in to your favorite websites. When you sign in to your PC with a Microsoft account, you'll connect your PC to the people, files, and devices you care about. Frequently asked questions - 79 You do not need a Microsoft ID to use Windows 10, but it makes life easier because you can sync data across different machines you sign in to using a Microsoft ID. Do I need one?
How do I get one?
If you've already installed Windows 10 and didn't sign in with a Microsoft account or you don't have a Microsoft account and want to get one, press the Windows key or select the Windows Start button >
Settings > Accounts > Sign in with a Microsoft account instead, and follow the onscreen instructions. How do I check for Windows updates?
Press the Windows key or select the Windows Start button > Settings
> Update & Security > Windows Update. Select Advanced options to configure the settings. Where can I get more information?
For more information please visit the following pages:
Windows 10 information: go.acer.com/windows-tutorial Support FAQs: support.acer.com Fr eq u en tl y as ked qu es t io ns 80 - Frequently asked questions Troubleshooting This chapter shows you how to deal with common system problems. Read it before calling a technician if a problem occurs. Solutions to more serious problems require opening up the computer. Do not attempt to open the computer yourself; contact your dealer or authorized service center for assistance. Troubleshooting tips incorporates an advanced design This computer onscreen error message reports to help you solve problems. If the system reports an error message or an error symptom occurs, see "Error messages" below. If the problem cannot be resolved, contact your dealer. that delivers Error messages If you receive an error message, note the message and take the corrective action. The following table lists the error messages in alphabetical order together with the recommended course of action. Error messages Corrective action CMOS battery bad Contact your dealer or an authorized service center. CMOS checksum error Contact your dealer or an authorized service center. Disk boot failure Equipment configuration error Insert a system (bootable) disk, then press Enter to reboot. Press F2 (during POST) to enter the BIOS utility, then press Exit in the BIOS utility to reboot. Hard disk 0 error Contact your dealer or an authorized service center. Hard disk 0 extended type error Contact your dealer or an authorized service center. Frequently asked questions - 81 Error messages Corrective action I/O parity error Contact your dealer or an authorized service center. Keyboard error or no keyboard connected Contact your dealer or an authorized service center. Keyboard interface error Contact your dealer or an authorized service center. Memory size mismatch Press F2 (during POST) to enter the BIOS utility, then press Exit in the BIOS utility to reboot. If you still encounter problems after going through the corrective measures, please contact your dealer or an authorized service center for assistance. 82 - Internet and online security I N T E R N E T A N D O N L I N E S E C U R I T Y First steps on the net Protecting your computer It is vital to protect your computer from viruses and attacks over the internet (see Internet security software on page 86). A comprehensive internet security program is offered when you first start your computer. You should activate this protection as soon as possible, certainly before you connect to the internet. Choose an Internet Service Provider Using the internet has become a natural part of daily computing. Just a few simple steps can connect you to a vast collection of knowledge and communication tools. To accomplish these steps you should first select an Internet Service Provider (ISP), which supplies the connection between your computer and the internet. You should research the ISPs available in your region, not forgetting to talk to friends and family about their experiences or to check reviews and consumer reports. The ISP you select will provide instructions on how to connect to the internet (you may need additional software or a special box that connects to your phone line). Connection types Dial-up Depending on your computer model, your location and your communication needs, you have several ways to connect to the internet. Some computers include a telephone dial-up (modem) connector. This allows you to connect to the internet using your telephone line. With a dial-up connection, you cannot use the modem and the telephone simultaneously on a single phone line. This type of connection is recommended only if you have limited use of the internet as the connection speed is low and connection time is typically charged per hour. Internet and online security - 83 DSL (e.g. ADSL) DSL (Digital Subscriber Line) is an always-on connection that runs over the phone line. As DSL and phone do not use the same frequencies, you can use your telephone at the same time you are connected to the internet (this requires a micro-filter on each telephone socket to avoid interference). To be eligible for DSL, you must be located near an DSL-equipped phone exchange (service is sometimes unavailable in rural areas). Connection speeds vary depending on your location, but DSL generally provides very fast and reliable internet connection. As the connection is always-on, it is generally charged at fixed monthly rates. Note A DSL connection requires an appropriate modem. A modem is usually provided by the ISP when you register. Many of these modems include an router that provides network and Wi-Fi access. Cable Cellular A cable connection provides fast and always-on internet service via a cable television line. This service is generally available in large cities. You can use your telephone and watch cable TV at the same time you are connected to the internet. A cellular connection allows you to use cellular networks (such as those used by a mobile phone) to connect to the internet while away from home. The socket for a SIM card may be built in to your computer, or may require an external device, such as a USB modem or even an appropriately equipped mobile phone. Note If your computer includes a SIM card slot, you require a compatible SIM card and a contract with a cellular provider. Before using the cellular features, check with your service provider to see if any additional charges will be incurred, especially roaming charges. 84 - Internet and online security Network connections A LAN (Local Area Network) is a group of computers (for example, within an office building or home) that share a common communications line and resources. When you set up a network, you can share files, peripheral devices (such as a printer) and an internet connection. You can set up a LAN using wired technologies (such as Ethernet) or wireless technologies (such as Wi-Fi or Bluetooth). Wireless networks A wireless LAN or WLAN is a wireless local area network, which may link two or more computers without using wires. Setting up a wireless network is easy and allows you to share files, peripheral devices and an internet connection. What are benefits of a wireless network?
Mobility Wireless LAN systems allow you and other users of your home network to share access to files and devices connected to the network, for example a printer or scanner. Also you can share an internet connection with other computers in your home. Installation speed and simplicity Installing a wireless LAN system can be fast and easy and eliminates the need to pull cables through walls and ceilings. Components of a wireless LAN To set up your Wireless network at home you need to have the following:
Access point (router) Access points (routers) are two-way transceivers that broadcast data into the surrounding environment. Access points act as a mediator between wired and wireless network. Most routers have a built-in DSL modem that will allow you access to a high speed DSL internet connection. The ISP (Internet Service Provider) you have chosen normally supplies a modem/router with the subscription to their Internet and online security - 85 services. Read carefully the documentation supplied with your Access point/router for detailed setup instructions. Network cable (RJ45) A network cable (also called RJ45 cable) is used to connect the host computer to the access point (see illustration below); this type of cable may also be used to connect peripheral devices to the access point. Wireless adapter Most computers feature a wireless module and Wi-Fi button that turns the network connection on or off. You may also turn your wireless network on or off, or control what is shared over the network with the network management options. Warning Using wireless devices while flying in aircraft may be prohibited. Switch off all devices before boarding an aircraft; they may be dangerous to the operation of the aircraft, disrupt communications, and even be illegal. After take off, ask the cabin crew if you may enable Wi-Fi. Surf the Net!
To surf the internet, you need a program called an internet browser. Microsoft Edge provides an easy and secure web browsing experience. As soon as you have your internet access installed and you are connected, from the Start Menu, click the Microsoft Edge tile or the icon located in the taskbar and take your internet experience to a new level!
Acer website To get you started why not visit our website, www.acer.com. Acer is dedicated to provide you with on-going personalized support. Check out our Support section to get help tailored to your needs. www.acer.com is your portal to a world of online activities and services: visit us regularly for the latest information and downloads!
86 - Internet and online security Internet security software To help you stay ahead of cybercriminals, Acer has partnered with Norton to offer you security for all your devices. Select Acer computers include protection by Norton Security Norton Security is pre-installed on select Acer computers, protecting your identity and financial data from viruses, spyware, malware and other online threats. Learn more about how to stay safe online and how to stay protected after your introductory subscription ends. Note Specifications vary depending on model or Operating System. Staying ahead of cybercriminals Stay ahead of hackers and cybercriminals by understanding the tactics they use to access your private data. Ensure your software is up to date Cybercriminals rely heavily upon software or platform vulnerabilities, as they are the easiest way to sneak malware into a user's device unnoticed, sometimes with little action on the user's part. Immediately after a software manufacturer announces an update, hackers are ready with malware that can breach holes in the software that would have been patched if the update was installed. How to stay safe: Perform any and all software updates as soon as they are available. Keep a lookout for fake or phishing emails Beware of emails that appear to be from a friend or business colleague that you know but seem a little odd. Maybe they didn't capitalize your name or there are misspellings. The email might be from cybercriminals who are trying to fool you into sending them your credit card number, social security number, or logging into a fake bank website that looks like yours but really isn't. How to stay safe: Use a strong antispam filter. If an email looks strange, don't click on anything and delete it immediately. Instead manually launch a browser and type in your bank's website address and log-in yourself. Internet and online security - 87 Don't be fooled if someone calls your phone A tech support scam is a form of online fraud where people call you on the phone saying they're Technical Support from a trusted company like Norton or Microsoft and that you have a virus. The main motive behind these scams is to extort money from the victim. Cybercriminals can also install malware such as keylogging software or backdoor Trojans in order to gain access to personal information. How to stay safe: Don't fall for phone calls that tell you your software or computer isn't working. Never give your personal information like social security or credit card numbers to someone that you don't know over the phone. Common threats cybercriminals use Now you know a few very common ways cybercriminals try to sneak onto your device or trick you into providing private information to them directly. Here are a few of the types of malware they like to deploy once they've got into a device and what to do if you're ever infected. Ransomware A form of malware that will encrypt personal data files on your computer and attached devices. Encryption converts files into another format, that can only be opened with a specific decryption key. Once the ransomware installs itself, it will display a warning message that the computer is now locked. The user is given a specific amount of money to pay as a "fine" and a timeframe in which to pay. Even if paid, the criminal might choose to not unencrypt the files anyway!
What to do if you're infected: Avoid getting infected in the first place by staying protected with internet security software like Norton Security. Also, perform regular backups of all your data either online or to a separate external hard drive that is only attached to your computer while performing the backup. Ransomware has been known to lock access to external hard drives attached to the computer. If you are infected with ransomware, think twice before you pay the ransom. There is no guarantee the cybercriminal will unlock your files and you'll be funding them to prey upon another innocent victim. 88 - Internet and online security Botnets A botnet is a string of infected, connected computers coordinated together to perform a task. Botnets gain access to your machine through some piece of malicious coding. Once the software is downloaded, the botnet will now contact its master computer and let it know that everything is ready to go. Now your computer, phone, tablet, or IoT device is entirely under the control of the person who created the botnet. Most people who are infected with botnets aren't even aware that their computer's security has become compromised!
What to do if you're infected: If you're infected you probably don't realize it as bots are notoriously quiet. Your Internet Service Provider might send you a notification alerting you that they found a threat on your network and that you need to remove the bot. If you have a bot, use internet security software like Norton Security to scan all of your devices. Viruses/Malware
"Virus" is the commonplace word for all malicious software programs for years now; however, a virus is just one type of malicious threat. A virus is classified as a self-replicating piece of malicious code that travels by inserting itself into files or programs. What to do if you're infected: Take steps to avoid infection by staying protected with internet security software like Norton Security. If you subscribed to Norton Security and think you may have a virus, contact Norton's on-call technicians to help eliminate the virus. Take special precautions when using public Wi-Fi Public Wi-Fi is available just about everywhere, from the local coffee shop to the hotels and airports you visit while traveling. While public Wi-Fi has made our lives a little easier, it also poses security risks to the personal information available on our laptops and smartphones. A virtual private network (VPN) gives you online privacy and anonymity by creating a private network from a public internet connection. VPNs mask your internet protocol (IP) address so your online actions are virtually untraceable as well as secure. One of the biggest security risks on public Wi-Fi are man-in-the-middle attacks (MITM). These attacks are akin to eavesdropping. Data is sent from point A
(computer) to point B (server/website), and an attacker can get in-
Internet and online security - 89 between these transmissions. They then set up tools programmed to
"listen in" on transmissions, intercept data that is specifically targeted as valuable, and capture the data, such as your login credentials and passwords. Use a virtual private network (VPN) to ensure your privacy and anonymity are protected when you use public Wi-Fi. VPN services can encrypt all the data that you send and receive while using a public Wi-Fi hotspot, securing your information from hackers and other users of the same connection. For more tips on how to stay safe Good security habits can reduce your exposure to online crime. By adopting a few basic behaviors, you can make big strides in reducing cybercrime risk:
Protect your accounts with strong, unique passwords that use a combination of at least 10 uppercase and lowercase letters, symbols and numbers. Don't click on random links or open unsolicited messages and attachments-particularly from people you don't know. Don't access any personal information or social media accounts over unprotected Wi-Fi networks. Use security software on your devices to help protect yourself from the latest threats. Protect your computer with Windows security tools Windows provides a variety of protection applications. Windows Updates If you have an active internet connection, Windows can check for important updates for your computer and install them automatically. These updates include security patches and program updates that can improve your computing experience and help protect your computer against new viruses and attacks. How do I know when my computer is at risk?
If the Action Center reports an alert, or if your computer behaves erratically, crashes unexpectedly or if some of your programs do not work correctly, your computer may be infected by malicious software. 90 - Internet and online security However, do not blame every computer problem on a virus! If you suspect your computer is infected, the first thing to do is update, if you have not already done so, and run your antivirus and anti-spyware software.
1 2 3 | Internal Photos | Internal Photos | 655.94 KiB | February 28 2020 / August 27 2020 | delayed release |
1 2 3 | External Photos | External Photos | 584.87 KiB | February 28 2020 / August 27 2020 | delayed release |
1 2 3 | ID Label/Location Info | ID Label/Location Info | 60.63 KiB | February 28 2020 / March 05 2020 |
Label Location Host Model Name: N18P6, the label stick on the bottom side. Label (Rating) Label
(RF LTE Module) Label Drawing
1 2 3 | Class II permissive change letter | Cover Letter(s) | 110.81 KiB | February 28 2020 / March 05 2020 |
Acer Incorporated 8F, 88, Sec. 1, Xintai 5th Rd., Xizhi New Taipei City 221, Taiwan Requesting Class II permissive change for FCC ID: HLZN18P6 Date: Feb. 24, 2020 Federal Communications Commission 7435 Oakland Mills Road Columbia MD 21046 C.C.: SGS Taiwan Limited Subject:
To Whom It May Concern:
The purpose of this letter is to request a Class II Permissive change for FCC ID: HLZN18P6 Original grant date: 17/02/2020 Applicant: Acer Incorporated The major change filed under this application is 1. The subject approved module is being used in different host (Portable category Configuration, Host Brand/Model: See test report). 2. SAR Testing is performed to demonstrate RF Compliance. 3. EMC has been evaluated as no degrade the characteristics that reported to the FCC at the initial certification. 4. Antenna is of same type and lower gain from original approval as below:
Vendor Antenna Part Number Frequency(MHz Gain (dBi) 81EABA15.G91 WNC PIFA 1750 3.72 750 0.50 835 2.23 1900 3.63 2600 2.79 5. LTE B30 transmitter are disabled via software. Best Regards Title:
RU Jan / Manager On behalf of: Acer Incorporated Telephone:
886-2696-3131 ext.3289 Fax: 886-2-8691-3120 E-mail: RU.Jan@acer.com
1 2 3 | Confidentiality | Cover Letter(s) | 77.63 KiB | February 28 2020 / March 05 2020 |
FCC, Request for non-disclosure RF_501, Issue 6 Date: 16-Jul-10 Page 1 of 1 Company Name:
Address:
City:
Country:
Acer Incorporated 8F., No. 88, Sec. 1, Xintai 5th Rd., Xizhi, New Taipei City 22181, Taiwan (R.O.C) Edisonstraat 12A 6902 PK ZEVENAAR The Netherlands To: Telefication B.V., Dept. FCC TCB Subject: Request for confidentiality FCC ID: HLZN18P6 Reference number: ######
Dear FCC TCB, 1. Long-Term Confidentiality Pursuant to 47 CFR Section 0.459(a) & (b), we hereby requests non-disclosure and confidential treatment of the following materials submitted in support of FCC certification application:
Bill(s) of Material Block Diagrams Operational Description Schematic Diagrams Tune-up Procedure Above materials contain secrets, proprietary and technical information, which would customarily be guarded from competitors under 47 CFR, section 0.457(d)(2). Disclosure or publication or any portion of this company confidential material to other parties could cause substantial competitive harm and provide unjustified benefits for competitors. 2. Short-Term Confidentiality (STC) Pursuant to Public Notice DA 04-1705 of the Commissions policy, in order to comply with the marketing regulations in 47 CFR 2.803 and the importation rules in 47 CFR 2.1204, applicant hereby requests Short-Term Confidential treatment of the following materials (note 1):
Internal Photos Users Manual Test Set-up Photos External Photos Justification: Ensuring that business sensitive information remains confidential until the actual marketing of newly authorized devices. Planned Release Date STC: 180 days (notes 2, 3, 4, 5) Name and signature of applicant:
Date: Jan. 02, 2020 Notes:
1) A document or type of document can only have ONE type of confidentiality!
2) Short-Term confidentiality is in principle for 45 days from date of grant; it can be extended max 3 times (total time 180 days max.)!
3) FCC must be informed when marketing begins earlier. 4) Release takes place automatically thus extension must be requested in time. Telefication does not remind you of this!
5) Request for extension or for release must be received by Telefication at least 7 days before date of actual marketing or before expiration of the STC period
1 2 3 | Declaration of authorization | Cover Letter(s) | 86.36 KiB | February 28 2020 / March 05 2020 |
RF_160, Issue 04 Acer Incorporated 8F, 88, Sec. 1, Xintai 5th Rd., Xizhi New Taipei City 221, Taiwan 8F., No. 88, Sec. 1, Xintai 5th Rd., Xizhi, New Taipei City 22181, New Taipei City Taiwan (R.O.C) Declaration of Authorization We Name: Acer Incorporated Address:
City:
Country:
Declare that:
Name Representative of agent: Jim Chang (1) Agent Company name: SGS Taiwan Ltd. Address: 134, Wu Kung Road, Wu ku Industrial Zone TW- New Taipei City 24803 City: New Taipei City Country: Taiwan is authorized to apply for Certification of the following product(s):
Product description: LTE-A Cat 12 M.2 Module Type designation:
FCC ID: HLZN18P6 Validity/ expiry date on our behalf. Date: 2020/1/2 City: New Taipei City Name: RU Jan (2) Function: Manager Signature:
N18P6 Notes:
(1): Required for FCC application
(2): For FCC it must be the Grantee Code owner or the authorized agent.
1 2 3 | FCC Grantee Signature Authorization Letter | Cover Letter(s) | 20.15 KiB | February 28 2020 / March 05 2020 |
Acer Incorporated 8F, 88, Sec. 1, Hsin Tai Wu Rd., Hsichih New Taipei City 22181, Taiwan, R.O.C. TEL: +886-2-2696-3131 ext.3089 Fax : 886-2-8691-3120 www.acer.com Date:2011/8/22 To who may concern, I, the undersigned, responsible for the designated person in FCC grant communicator / IC company code contactor, hereby authorized RU Jan to sign the FCC / IC application form for certification process. Thank you, Sincerely Yours, Contact Person: Harriot S.L. Lee Company Name: Acer Incorporated E-Mail: harriot_lee@acer.com.tw
1 2 3 | Test Setup Photos | Test Setup Photos | 315.80 KiB | February 28 2020 / August 27 2020 | delayed release |
1 2 3 | FCC Auth Ltr for Change of ID | Cover Letter(s) | 56.29 KiB | February 13 2020 / February 17 2020 |
Federal Communications Commission 7435 Oakland Mills Road Columbia, Maryland 21046 USA Re: Change of Identification Authorization, FCC ID: XMR201901EM12G Date: January 3, 2020 To Whom It May Concern:
This letter grants authorization for representatives of Acer Incorporated to apply to the FCC for a change in identification as specified under 47CFR2.933 of the FCC rules. This authorization applies to the Quectel Wireless Solutions Co., Ltd., model: EM12-G, FCC ID:
XMR201901EM12G, approved on 02/01/2019. We are aware that Acer Incorporated intends to market the above referenced product under their FCC ID: HLZN18P6, part number N18P6. Sincerely, Jean Hu Certification Section Quectel Wireless Solutions Co., Ltd.
+86-21-51086236 ext 6511 jean.hu@quectel.com Date: January 3, 2020
1 2 3 | FCC Auth Ltr for Change of ID New Grantee | Cover Letter(s) | 95.80 KiB | February 13 2020 / February 17 2020 |
Acer Incorporated 8F, 88, Sec. 1, Xintai 5th Rd., Xizhi New Taipei City 221, Taiwan Federal Communications Commission 7435 Oakland Mills Road Columbia, Maryland 21046 USA Re: Change of Identification Authorization, FCC ID: HLZN18P6 To Whom It May Concern:
The purpose of this letter is to apply for a change in identification as specified under 47CFR2.933 of the FCC rules, based on the original FCC ID: XMR201901EM12G, grant date: 02/01/2019. The equipment bearing the modified FCC ID: HLZN18P6 is no different from the original equipment. The original test results continue to be representative of and applicable to the equipment bearing the changed identification. Sincerely, City: New Taipei City Name: RU Jan Function: Manager Signature:
frequency | equipment class | purpose | ||
---|---|---|---|---|
1 | 2020-03-05 | 2580 ~ 2610 | PCB - PCS Licensed Transmitter | Class II Permissive Change |
2 | 2020-02-17 | 2580 ~ 2610 | PCB - PCS Licensed Transmitter | Change in Identification |
3 | JAB - Part 15 Class B Digital Device |
app s | Applicant Information | |||||
---|---|---|---|---|---|---|
1 2 3 | Effective |
2020-03-05
|
||||
1 2 3 |
2020-02-17
|
|||||
1 2 3 | Applicant's complete, legal business name |
Acer Incorporated
|
||||
1 2 3 | FCC Registration Number (FRN) |
0013355508
|
||||
1 2 3 | Physical Address |
8F, 88, Sec 1, Hsin Tai Wu Rd
|
||||
1 2 3 |
Hsichih, Taipei Hsien
|
|||||
1 2 3 |
Taiwan
|
|||||
app s | TCB Information | |||||
1 2 3 | TCB Application Email Address |
c******@telefication.com
|
||||
1 2 3 | TCB Scope |
B1: Commercial mobile radio services equipment in the following 47 CFR Parts 20, 22 (cellular), 24,25 (below 3 GHz) & 27
|
||||
1 2 3 |
A1: Low Power Transmitters below 1 GHz (except Spread Spectrum), Unintentional Radiators, EAS (Part 11) & Consumer ISM devices
|
|||||
app s | FCC ID | |||||
1 2 3 | Grantee Code |
HLZ
|
||||
1 2 3 | Equipment Product Code |
N18P6
|
||||
app s | Person at the applicant's address to receive grant or for contact | |||||
1 2 3 | Name |
H**** S**** L********
|
||||
1 2 3 | Title |
Manager
|
||||
1 2 3 | Telephone Number |
886-2******** Extension:
|
||||
1 2 3 | Fax Number |
886-2********
|
||||
1 2 3 |
H******@acer.com.tw
|
|||||
app s | Technical Contact | |||||
1 2 3 | Firm Name |
SGS Taiwan Ltd.
|
||||
1 2 3 |
SGS Taiwan Ltd
|
|||||
1 2 3 | Name |
J******** C****
|
||||
1 2 3 | Physical Address |
134, Wu Kung Road, WuKu Industrial Zone
|
||||
1 2 3 |
Taiwan
|
|||||
1 2 3 | Telephone Number |
88622******** Extension:
|
||||
1 2 3 |
886 2********
|
|||||
1 2 3 | Fax Number |
88622********
|
||||
1 2 3 |
886 2********
|
|||||
1 2 3 |
j******@sgs.com
|
|||||
app s | Non Technical Contact | |||||
1 2 3 | Firm Name |
SGS Taiwan Ltd.
|
||||
1 2 3 |
SGS Taiwan Ltd
|
|||||
1 2 3 | Name |
J******** C******
|
||||
1 2 3 | Physical Address |
134, Wu Kung Road, WuKu Industrial Zone
|
||||
1 2 3 |
Taiwan
|
|||||
1 2 3 | Telephone Number |
88622******** Extension:
|
||||
1 2 3 |
886 2********
|
|||||
1 2 3 | Fax Number |
88622********
|
||||
1 2 3 |
886 2********
|
|||||
1 2 3 |
j******@sgs.com
|
|||||
app s | Confidentiality (long or short term) | |||||
1 2 3 | Does this application include a request for confidentiality for any portion(s) of the data contained in this application pursuant to 47 CFR § 0.459 of the Commission Rules?: | Yes | ||||
1 2 3 | No | |||||
1 2 3 | Long-Term Confidentiality Does this application include a request for confidentiality for any portion(s) of the data contained in this application pursuant to 47 CFR § 0.459 of the Commission Rules?: | Yes | ||||
1 2 3 | No | |||||
1 2 3 | If so, specify the short-term confidentiality release date (MM/DD/YYYY format) | 08/27/2020 | ||||
if no date is supplied, the release date will be set to 45 calendar days past the date of grant. | ||||||
app s | Cognitive Radio & Software Defined Radio, Class, etc | |||||
1 2 3 | Is this application for software defined/cognitive radio authorization? | No | ||||
1 2 3 | Equipment Class | PCB - PCS Licensed Transmitter | ||||
1 2 3 | JAB - Part 15 Class B Digital Device | |||||
1 2 3 | Description of product as it is marketed: (NOTE: This text will appear below the equipment class on the grant) | LTE-A Cat 12 M.2 Module | ||||
1 2 3 | Related OET KnowledgeDataBase Inquiry: Is there a KDB inquiry associated with this application? | No | ||||
1 2 3 | Modular Equipment Type | Single Modular Approval | ||||
1 2 3 | Purpose / Application is for | Class II Permissive Change | ||||
1 2 3 | Change in Identification | |||||
1 2 3 | Composite Equipment: Is the equipment in this application a composite device subject to an additional equipment authorization? | No | ||||
1 2 3 | Yes | |||||
1 2 3 | Related Equipment: Is the equipment in this application part of a system that operates with, or is marketed with, another device that requires an equipment authorization? | No | ||||
1 2 3 | Grant Comments | Class II Permissive Change : This change is (1) to incorporate the module into Notebook Computer(Brand/model number : acer/N18P6) as described in this filing, (2) to disable LTE band 30 via software. The highest reported SAR values for body, use condition is 1.19 W/kg. Single Modular Approval. Power output listed is conducted at the antenna terminal. This device is to be used only for mobile and fixed application, and must not be colocated or operating in conjunction with any other antenna or transmitter, except in accordance with FCC multi-transmitter evaluation procedures as documented in this filing. OEM integrators must be provided with antenna installation instructions, and labeling requirements for finished products. OEM integrators and End-users must be provided with transmitter operation conditions for satisfying RF exposure compliance. For mobile and fixed operating configurations the antenna gain, including cable loss, must not exceed 5 dBi at 700 MHz, 6 dBi at 800/850 MHz, 5 dBi at 1700 MHz, 7 dBi at 1900 MHz and 2500/2600 MHz, and 4 dBi at 2300 MHz as defined in 2.1091 for satisfying RF exposure compliance. Under no conditions may an antenna gain be used that would exceed the ERP and EIRP power limits as specified in Parts 22, Part 24 and Part 27. | ||||
1 2 3 | Single Modular Approval. Power output listed is conducted at the antenna terminal. This device is to be used only for mobile and fixed application, and must not be colocated or operating in conjunction with any other antenna or transmitter, except in accordance with FCC multi-transmitter evaluation procedures as documented in this filing. OEM integrators must be provided with antenna installation instructions, and labeling requirements for finished products. OEM integrators and End-users must be provided with transmitter operation conditions for satisfying RF exposure compliance. For mobile and fixed operating configurations the antenna gain, including cable loss, must not exceed 5 dBi at 700 MHz, 6 dBi at 800/850 MHz, 5 dBi at 1700 MHz, 7 dBi at 1900 MHz and 2500/2600 MHz, and 4 dBi at 2300 MHz as defined in 2.1091 for satisfying RF exposure compliance. Under no conditions may an antenna gain be used that would exceed the ERP and EIRP power limits as specified in Parts 22, Part 24 and Part 27. | |||||
1 2 3 | Is there an equipment authorization waiver associated with this application? | No | ||||
1 2 3 | If there is an equipment authorization waiver associated with this application, has the associated waiver been approved and all information uploaded? | No | ||||
app s | Test Firm Name and Contact Information | |||||
1 2 3 | Firm Name |
SGS Taiwan Ltd. Electronics & Communication Lab
|
||||
1 2 3 |
Sporton International (Kunshan) Inc.
|
|||||
1 2 3 | Name |
R******** W********
|
||||
1 2 3 |
J******** T********
|
|||||
1 2 3 | Telephone Number |
+886-******** Extension:
|
||||
1 2 3 |
+86 0********
|
|||||
1 2 3 | Fax Number |
+886-********
|
||||
1 2 3 |
r******@sgs.com
|
|||||
1 2 3 |
J******@sporton.com.tw
|
|||||
Equipment Specifications | |||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
1 | 1 | 22H | 826.4 | 846.6 | 0.1897 | 0.0442 ppm | 4M13F9W | ||||||||||||||||||||||||||||||||||
1 | 2 | 24E | 1852.4 | 1907.6 | 0.2028 | 0.0239 ppm | 4M13F9W | ||||||||||||||||||||||||||||||||||
1 | 3 | 27 | 1712.4 | 1752.6 | 0.1986 | 0.0167 ppm | 4M12F9W | ||||||||||||||||||||||||||||||||||
1 | 4 | 24E | 1860 | 1900 | 0.2636 | 0.002 ppm | 18M4G7D | ||||||||||||||||||||||||||||||||||
1 | 5 | 24E | 1860 | 1900 | 0.2143 | 0.002 ppm | 18M3W7D | ||||||||||||||||||||||||||||||||||
1 | 6 | 24E | 1860 | 1900 | 0.2148 | 0.002 ppm | 18M3W7D | ||||||||||||||||||||||||||||||||||
1 | 7 | 24E | 1855 | 1905 | 0.2239 | 0.002 ppm | 9M07W7D | ||||||||||||||||||||||||||||||||||
1 | 8 | 24E | 1855 | 1905 | 0.2213 | 0.002 ppm | 9M05W7D | ||||||||||||||||||||||||||||||||||
1 | 9 | 27 | 1720 | 1745 | 0.246 | 0.0023 ppm | 18M4G7D | ||||||||||||||||||||||||||||||||||
1 | 1 | 27 | 1720 | 1745 | 0.2113 | 0.0023 ppm | 18M5W7D | ||||||||||||||||||||||||||||||||||
1 | 11 | 27 | 1720 | 1745 | 0.208 | 0.0023 ppm | 18M4W7D | ||||||||||||||||||||||||||||||||||
1 | 12 | 27 | 1717.5 | 1747.5 | 0.2208 | 0.0023 ppm | 13M5W7D | ||||||||||||||||||||||||||||||||||
1 | 13 | 22H | 829 | 844 | 0.2535 | 0.0078 ppm | 9M05G7D | ||||||||||||||||||||||||||||||||||
1 | 14 | 22H | 829 | 844 | 0.2173 | 0.0078 ppm | 9M03W7D | ||||||||||||||||||||||||||||||||||
1 | 15 | 22H | 829 | 844 | 0.2213 | 0.0078 ppm | 9M03W7D | ||||||||||||||||||||||||||||||||||
1 | 16 | 22H | 826.5 | 846.5 | 0.2198 | 0.0078 ppm | 4M50W7D | ||||||||||||||||||||||||||||||||||
1 | 17 | 27 | 2510 | 2560 | 0.2265 | 0.0026 ppm | 18M4G7D | ||||||||||||||||||||||||||||||||||
1 | 18 | 27 | 2510 | 2560 | 0.1968 | 0.0026 ppm | 18M5W7D | ||||||||||||||||||||||||||||||||||
1 | 19 | 27 | 2510 | 2560 | 0.1892 | 0.0026 ppm | 18M3W7D | ||||||||||||||||||||||||||||||||||
1 | 2 | 27 | 2505 | 2565 | 0.1982 | 0.0026 ppm | 9M01W7D | ||||||||||||||||||||||||||||||||||
1 | 21 | 27 | 2505 | 2565 | 0.1945 | 0.0026 ppm | 9M07W7D | ||||||||||||||||||||||||||||||||||
1 | 22 | 27 | 2510 | 2540.2 | 0.1824 | 0.0026 ppm | 37M6G7D | ||||||||||||||||||||||||||||||||||
1 | 23 | 27 | 2510 | 2540.2 | 0.1633 | 0.0026 ppm | 37M4W7D | ||||||||||||||||||||||||||||||||||
1 | 24 | 27 | 2510 | 2540.2 | 0.1476 | 0.0026 ppm | 37M7W7D | ||||||||||||||||||||||||||||||||||
1 | 25 | 27 | 2510 | 2545.1 | 0.2344 | 0.0026 ppm | 37M7W7D | ||||||||||||||||||||||||||||||||||
1 | 26 | 27 | 2510 | 2545.1 | 0.2123 | 0.0026 ppm | 33M2W7D | ||||||||||||||||||||||||||||||||||
1 | 27 | 27 | 2510 | 2545.1 | 0.2089 | 0.0026 ppm | 32M9W7D | ||||||||||||||||||||||||||||||||||
1 | 28 | 27 | 704 | 711 | 0.2188 | 0.0102 ppm | 9M05G7D | ||||||||||||||||||||||||||||||||||
1 | 29 | 27 | 704 | 711 | 0.1954 | 0.0102 ppm | 9M01W7D | ||||||||||||||||||||||||||||||||||
1 | 3 | 27 | 704 | 711 | 0.1892 | 0.0102 ppm | 9M07W7D | ||||||||||||||||||||||||||||||||||
1 | 31 | 27 | 701.5 | 713.5 | 0.2228 | 0.0102 ppm | 4M51G7D | ||||||||||||||||||||||||||||||||||
1 | 32 | 27 | 782 | 782 | 0.2046 | 0.0088 ppm | 9M07G7D | ||||||||||||||||||||||||||||||||||
1 | 33 | 27 | 782 | 782 | 0.1875 | 0.0088 ppm | 9M03W7D | ||||||||||||||||||||||||||||||||||
1 | 34 | 27 | 782 | 782 | 0.1824 | 0.0088 ppm | 9M05W7D | ||||||||||||||||||||||||||||||||||
1 | 35 | 27 | 779.5 | 784.5 | 0.2089 | 0.0088 ppm | 4M50G7D | ||||||||||||||||||||||||||||||||||
1 | 36 | 9 | 793 | 793 | 0.2042 | 0.0044 ppm | 9M07G7D | ||||||||||||||||||||||||||||||||||
1 | 37 | 9 | 793 | 793 | 0.1652 | 0.0044 ppm | 8M99W7D | ||||||||||||||||||||||||||||||||||
1 | 38 | 9 | 793 | 793 | 0.1629 | 0.0044 ppm | 9M03W7D | ||||||||||||||||||||||||||||||||||
1 | 39 | 9 | 790.5 | 795.5 | 0.1845 | 0.0044 ppm | 4M49W7D | ||||||||||||||||||||||||||||||||||
1 | 4 | 9 | 790.5 | 795.5 | 0.1858 | 0.0044 ppm | 4M50W7D | ||||||||||||||||||||||||||||||||||
1 | 41 | 27 | 709 | 711 | 0.2188 | 0.0102 ppm | 9M05G7D | ||||||||||||||||||||||||||||||||||
1 | 42 | 27 | 709 | 711 | 0.1954 | 0.0102 ppm | 9M01W7D | ||||||||||||||||||||||||||||||||||
1 | 43 | 27 | 709 | 711 | 0.1892 | 0.0102 ppm | 9M07W7D | ||||||||||||||||||||||||||||||||||
1 | 44 | 27 | 706.5 | 713.5 | 0.2228 | 0.0102 ppm | 4M51G7D | ||||||||||||||||||||||||||||||||||
1 | 45 | 24E | 1860 | 1905 | 0.2636 | 0.002 ppm | 18M4G7D | ||||||||||||||||||||||||||||||||||
1 | 46 | 24E | 1860 | 1905 | 0.2143 | 0.002 ppm | 18M3W7D | ||||||||||||||||||||||||||||||||||
1 | 47 | 24E | 1860 | 1905 | 0.2148 | 0.002 ppm | 18M3W7D | ||||||||||||||||||||||||||||||||||
1 | 48 | 24E | 1855 | 1910 | 0.2239 | 0.002 ppm | 9M07W7D | ||||||||||||||||||||||||||||||||||
1 | 49 | 24E | 1855 | 1910 | 0.2213 | 0.002 ppm | 9M05W7D | ||||||||||||||||||||||||||||||||||
1 | 5 | 22H | 831.5 | 841.5 | 0.2307 | 0.0078 ppm | 13M5G7D | ||||||||||||||||||||||||||||||||||
1 | 51 | 22H | 831.5 | 841.5 | 0.2109 | 0.0078 ppm | 13M5W7D | ||||||||||||||||||||||||||||||||||
1 | 52 | 22H | 831.5 | 841.5 | 0.2004 | 0.0078 ppm | 13M4W7D | ||||||||||||||||||||||||||||||||||
1 | 53 | 9 | 821.5 | 821.5 | 0.2275 | 0.0084 ppm | 13M4G7D | ||||||||||||||||||||||||||||||||||
1 | 54 | 9 | 821.5 | 821.5 | 0.1977 | 0.0084 ppm | 13M4W7D | ||||||||||||||||||||||||||||||||||
1 | 55 | 9 | 821.5 | 821.5 | 0.1892 | 0.0084 ppm | 13M5W7D | ||||||||||||||||||||||||||||||||||
1 | 56 | 9 | 816.5 | 821.5 | 0.2512 | 0.0084 ppm | 4M50G7D | ||||||||||||||||||||||||||||||||||
1 | 57 | 9 | 816.5 | 821.5 | 0.2213 | 0.0084 ppm | 4M50W7D | ||||||||||||||||||||||||||||||||||
1 | 58 | 9 | 816.5 | 821.5 | 0.2198 | 0.0084 ppm | 4M51W7D | ||||||||||||||||||||||||||||||||||
1 | 59 | 27 | 2580 | 2610 | 0.228 | 0.002 ppm | 18M3G7D | ||||||||||||||||||||||||||||||||||
1 | 6 | 27 | 2580 | 2610 | 0.1875 | 0.002 ppm | 18M3W7D | ||||||||||||||||||||||||||||||||||
1 | 61 | 27 | 2580 | 2610 | 0.1758 | 0.002 ppm | 18M4W7D | ||||||||||||||||||||||||||||||||||
1 | 62 | 27 | 2575 | 2615 | 0.1766 | 0.002 ppm | 9M05W7D | ||||||||||||||||||||||||||||||||||
1 | 63 | 27 | 2580 | 2590.2 | 0.2014 | 0.002 ppm | 37M7G7D | ||||||||||||||||||||||||||||||||||
1 | 64 | 27 | 2580 | 2590.2 | 0.1641 | 0.002 ppm | 37M7W7D | ||||||||||||||||||||||||||||||||||
1 | 65 | 27 | 2580 | 2590.2 | 0.1197 | 0.002 ppm | 37M6W7D | ||||||||||||||||||||||||||||||||||
1 | 66 | 27 | 2577.5 | 2597.5 | 0.2018 | 0.002 ppm | 28M7G7D | ||||||||||||||||||||||||||||||||||
1 | 67 | 27 | 2506 | 2680 | 0.228 | 0.002 ppm | 18M3G7D | ||||||||||||||||||||||||||||||||||
1 | 68 | 27 | 2506 | 2680 | 0.1875 | 0.002 ppm | 18M3W7D | ||||||||||||||||||||||||||||||||||
1 | 69 | 27 | 2506 | 2680 | 0.1758 | 0.002 ppm | 18M4W7D | ||||||||||||||||||||||||||||||||||
1 | 7 | 27 | 2506 | 2680 | 0.1766 | 0.002 ppm | 9M05W7D | ||||||||||||||||||||||||||||||||||
1 | 71 | 27 | 2506 | 2660.2 | 0.2014 | 0.002 ppm | 37M7G7D | ||||||||||||||||||||||||||||||||||
1 | 72 | 27 | 2506 | 2660.2 | 0.1641 | 0.002 ppm | 37M7W7D | ||||||||||||||||||||||||||||||||||
1 | 73 | 27 | 2506 | 2660.2 | 0.1197 | 0.002 ppm | 37M6W7D | ||||||||||||||||||||||||||||||||||
1 | 74 | 27 | 2506 | 2665.1 | 0.2495 | 0.002 ppm | 32M9G7D | ||||||||||||||||||||||||||||||||||
1 | 75 | 27 | 2506 | 2665.1 | 0.2148 | 0.002 ppm | 33M1W7D | ||||||||||||||||||||||||||||||||||
1 | 76 | 27 | 1720 | 1770 | 0.246 | 0.0023 ppm | 18M4G7D | ||||||||||||||||||||||||||||||||||
1 | 77 | 27 | 1720 | 1770 | 0.2113 | 0.0023 ppm | 18M5W7D | ||||||||||||||||||||||||||||||||||
1 | 78 | 27 | 1720 | 1770 | 0.208 | 0.0023 ppm | 18M4W7D | ||||||||||||||||||||||||||||||||||
1 | 79 | 27 | 1717.5 | 1772.5 | 0.2208 | 0.0023 ppm | 13M5W7D | ||||||||||||||||||||||||||||||||||
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
2 | 1 | 22H | 826.4 | 846.6 | 0.1897 | 0.0442 ppm | 4M13F9W | ||||||||||||||||||||||||||||||||||
2 | 2 | 24E | 1852.4 | 1907.6 | 0.2028 | 0.0239 ppm | 4M13F9W | ||||||||||||||||||||||||||||||||||
2 | 3 | 27 | 1712.4 | 1752.6 | 0.1986 | 0.0167 ppm | 4M12F9W | ||||||||||||||||||||||||||||||||||
2 | 4 | 24E | 1860 | 1900 | 0.2636 | 0.002 ppm | 18M4G7D | ||||||||||||||||||||||||||||||||||
2 | 5 | 24E | 1860 | 1900 | 0.2143 | 0.002 ppm | 18M3W7D | ||||||||||||||||||||||||||||||||||
2 | 6 | 24E | 1860 | 1900 | 0.2148 | 0.002 ppm | 18M3W7D | ||||||||||||||||||||||||||||||||||
2 | 7 | 24E | 1855 | 1905 | 0.2239 | 0.002 ppm | 9M07W7D | ||||||||||||||||||||||||||||||||||
2 | 8 | 24E | 1855 | 1905 | 0.2213 | 0.002 ppm | 9M05W7D | ||||||||||||||||||||||||||||||||||
2 | 9 | 27 | 1720 | 1745 | 0.246 | 0.0023 ppm | 18M4G7D | ||||||||||||||||||||||||||||||||||
2 | 1 | 27 | 1720 | 1745 | 0.2113 | 0.0023 ppm | 18M5W7D | ||||||||||||||||||||||||||||||||||
2 | 11 | 27 | 1720 | 1745 | 0.208 | 0.0023 ppm | 18M4W7D | ||||||||||||||||||||||||||||||||||
2 | 12 | 27 | 1717.5 | 1747.5 | 0.2208 | 0.0023 ppm | 13M5W7D | ||||||||||||||||||||||||||||||||||
2 | 13 | 22H | 829 | 844 | 0.2535 | 0.0078 ppm | 9M05G7D | ||||||||||||||||||||||||||||||||||
2 | 14 | 22H | 829 | 844 | 0.2173 | 0.0078 ppm | 9M03W7D | ||||||||||||||||||||||||||||||||||
2 | 15 | 22H | 829 | 844 | 0.2213 | 0.0078 ppm | 9M03W7D | ||||||||||||||||||||||||||||||||||
2 | 16 | 22H | 826.5 | 846.5 | 0.2198 | 0.0078 ppm | 4M50W7D | ||||||||||||||||||||||||||||||||||
2 | 17 | 27 | 2510 | 2560 | 0.2265 | 0.0026 ppm | 18M4G7D | ||||||||||||||||||||||||||||||||||
2 | 18 | 27 | 2510 | 2560 | 0.1968 | 0.0026 ppm | 18M5W7D | ||||||||||||||||||||||||||||||||||
2 | 19 | 27 | 2510 | 2560 | 0.1892 | 0.0026 ppm | 18M3W7D | ||||||||||||||||||||||||||||||||||
2 | 2 | 27 | 2505 | 2565 | 0.1982 | 0.0026 ppm | 9M01W7D | ||||||||||||||||||||||||||||||||||
2 | 21 | 27 | 2505 | 2565 | 0.1945 | 0.0026 ppm | 9M07W7D | ||||||||||||||||||||||||||||||||||
2 | 22 | 27 | 2510 | 2540.2 | 0.1824 | 0.0026 ppm | 37M6G7D | ||||||||||||||||||||||||||||||||||
2 | 23 | 27 | 2510 | 2540.2 | 0.1633 | 0.0026 ppm | 37M4W7D | ||||||||||||||||||||||||||||||||||
2 | 24 | 27 | 2510 | 2540.2 | 0.1476 | 0.0026 ppm | 37M7W7D | ||||||||||||||||||||||||||||||||||
2 | 25 | 27 | 2510 | 2545.1 | 0.2344 | 0.0026 ppm | 37M7W7D | ||||||||||||||||||||||||||||||||||
2 | 26 | 27 | 2510 | 2545.1 | 0.2123 | 0.0026 ppm | 33M2W7D | ||||||||||||||||||||||||||||||||||
2 | 27 | 27 | 2510 | 2545.1 | 0.2089 | 0.0026 ppm | 32M9W7D | ||||||||||||||||||||||||||||||||||
2 | 28 | 27 | 704 | 711 | 0.2188 | 0.0102 ppm | 9M05G7D | ||||||||||||||||||||||||||||||||||
2 | 29 | 27 | 704 | 711 | 0.1954 | 0.0102 ppm | 9M01W7D | ||||||||||||||||||||||||||||||||||
2 | 3 | 27 | 704 | 711 | 0.1892 | 0.0102 ppm | 9M07W7D | ||||||||||||||||||||||||||||||||||
2 | 31 | 27 | 701.5 | 713.5 | 0.2228 | 0.0102 ppm | 4M51G7D | ||||||||||||||||||||||||||||||||||
2 | 32 | 27 | 782 | 782 | 0.2046 | 0.0088 ppm | 9M07G7D | ||||||||||||||||||||||||||||||||||
2 | 33 | 27 | 782 | 782 | 0.1875 | 0.0088 ppm | 9M03W7D | ||||||||||||||||||||||||||||||||||
2 | 34 | 27 | 782 | 782 | 0.1824 | 0.0088 ppm | 9M05W7D | ||||||||||||||||||||||||||||||||||
2 | 35 | 27 | 779.5 | 784.5 | 0.2089 | 0.0088 ppm | 4M50G7D | ||||||||||||||||||||||||||||||||||
2 | 36 | 9 | 793 | 793 | 0.2042 | 0.0044 ppm | 9M07G7D | ||||||||||||||||||||||||||||||||||
2 | 37 | 9 | 793 | 793 | 0.1652 | 0.0044 ppm | 8M99W7D | ||||||||||||||||||||||||||||||||||
2 | 38 | 9 | 793 | 793 | 0.1629 | 0.0044 ppm | 9M03W7D | ||||||||||||||||||||||||||||||||||
2 | 39 | 9 | 790.5 | 795.5 | 0.1845 | 0.0044 ppm | 4M49W7D | ||||||||||||||||||||||||||||||||||
2 | 4 | 9 | 790.5 | 795.5 | 0.1858 | 0.0044 ppm | 4M50W7D | ||||||||||||||||||||||||||||||||||
2 | 41 | 27 | 709 | 711 | 0.2188 | 0.0102 ppm | 9M05G7D | ||||||||||||||||||||||||||||||||||
2 | 42 | 27 | 709 | 711 | 0.1954 | 0.0102 ppm | 9M01W7D | ||||||||||||||||||||||||||||||||||
2 | 43 | 27 | 709 | 711 | 0.1892 | 0.0102 ppm | 9M07W7D | ||||||||||||||||||||||||||||||||||
2 | 44 | 27 | 706.5 | 713.5 | 0.2228 | 0.0102 ppm | 4M51G7D | ||||||||||||||||||||||||||||||||||
2 | 45 | 24E | 1860 | 1905 | 0.2636 | 0.002 ppm | 18M4G7D | ||||||||||||||||||||||||||||||||||
2 | 46 | 24E | 1860 | 1905 | 0.2143 | 0.002 ppm | 18M3W7D | ||||||||||||||||||||||||||||||||||
2 | 47 | 24E | 1860 | 1905 | 0.2148 | 0.002 ppm | 18M3W7D | ||||||||||||||||||||||||||||||||||
2 | 48 | 24E | 1855 | 1910 | 0.2239 | 0.002 ppm | 9M07W7D | ||||||||||||||||||||||||||||||||||
2 | 49 | 24E | 1855 | 1910 | 0.2213 | 0.002 ppm | 9M05W7D | ||||||||||||||||||||||||||||||||||
2 | 5 | 22H | 831.5 | 841.5 | 0.2307 | 0.0078 ppm | 13M5G7D | ||||||||||||||||||||||||||||||||||
2 | 51 | 22H | 831.5 | 841.5 | 0.2109 | 0.0078 ppm | 13M5W7D | ||||||||||||||||||||||||||||||||||
2 | 52 | 22H | 831.5 | 841.5 | 0.2004 | 0.0078 ppm | 13M4W7D | ||||||||||||||||||||||||||||||||||
2 | 53 | 9 | 821.5 | 821.5 | 0.2275 | 0.0084 ppm | 13M4G7D | ||||||||||||||||||||||||||||||||||
2 | 54 | 9 | 821.5 | 821.5 | 0.1977 | 0.0084 ppm | 13M4W7D | ||||||||||||||||||||||||||||||||||
2 | 55 | 9 | 821.5 | 821.5 | 0.1892 | 0.0084 ppm | 13M5W7D | ||||||||||||||||||||||||||||||||||
2 | 56 | 9 | 816.5 | 821.5 | 0.2512 | 0.0084 ppm | 4M50G7D | ||||||||||||||||||||||||||||||||||
2 | 57 | 9 | 816.5 | 821.5 | 0.2213 | 0.0084 ppm | 4M50W7D | ||||||||||||||||||||||||||||||||||
2 | 58 | 9 | 816.5 | 821.5 | 0.2198 | 0.0084 ppm | 4M51W7D | ||||||||||||||||||||||||||||||||||
2 | 59 | 27 | 2310 | 2310 | 0.103 | 0.0017 ppm | 9M01G7D | ||||||||||||||||||||||||||||||||||
2 | 6 | 27 | 2310 | 2310 | 0.0881 | 0.0017 ppm | 8M99W7D | ||||||||||||||||||||||||||||||||||
2 | 61 | 27 | 2310 | 2310 | 0.0857 | 0.0017 ppm | 8M99W7D | ||||||||||||||||||||||||||||||||||
2 | 62 | 27 | 2307.5 | 2312.5 | 0.0861 | 0.0017 ppm | 4M51W7D | ||||||||||||||||||||||||||||||||||
2 | 63 | 27 | 2580 | 2610 | 0.228 | 0.002 ppm | 18M3G7D | ||||||||||||||||||||||||||||||||||
2 | 64 | 27 | 2580 | 2610 | 0.1875 | 0.002 ppm | 18M3W7D | ||||||||||||||||||||||||||||||||||
2 | 65 | 27 | 2580 | 2610 | 0.1758 | 0.002 ppm | 18M4W7D | ||||||||||||||||||||||||||||||||||
2 | 66 | 27 | 2575 | 2615 | 0.1766 | 0.002 ppm | 9M05W7D | ||||||||||||||||||||||||||||||||||
2 | 67 | 27 | 2580 | 2590.2 | 0.2014 | 0.002 ppm | 37M7G7D | ||||||||||||||||||||||||||||||||||
2 | 68 | 27 | 2580 | 2590.2 | 0.1641 | 0.002 ppm | 37M7W7D | ||||||||||||||||||||||||||||||||||
2 | 69 | 27 | 2580 | 2590.2 | 0.1197 | 0.002 ppm | 37M6W7D | ||||||||||||||||||||||||||||||||||
2 | 7 | 27 | 2577.5 | 2597.5 | 0.2018 | 0.002 ppm | 28M7G7D | ||||||||||||||||||||||||||||||||||
2 | 71 | 27 | 2506 | 2680 | 0.228 | 0.002 ppm | 18M3G7D | ||||||||||||||||||||||||||||||||||
2 | 72 | 27 | 2506 | 2680 | 0.1875 | 0.002 ppm | 18M3W7D | ||||||||||||||||||||||||||||||||||
2 | 73 | 27 | 2506 | 2680 | 0.1758 | 0.002 ppm | 18M4W7D | ||||||||||||||||||||||||||||||||||
2 | 74 | 27 | 2506 | 2680 | 0.1766 | 0.002 ppm | 9M05W7D | ||||||||||||||||||||||||||||||||||
2 | 75 | 27 | 2506 | 2660.2 | 0.2014 | 0.002 ppm | 37M7G7D | ||||||||||||||||||||||||||||||||||
2 | 76 | 27 | 2506 | 2660.2 | 0.1641 | 0.002 ppm | 37M7W7D | ||||||||||||||||||||||||||||||||||
2 | 77 | 27 | 2506 | 2660.2 | 0.1197 | 0.002 ppm | 37M6W7D | ||||||||||||||||||||||||||||||||||
2 | 78 | 27 | 2506 | 2665.1 | 0.2495 | 0.002 ppm | 32M9G7D | ||||||||||||||||||||||||||||||||||
2 | 79 | 27 | 2506 | 2665.1 | 0.2148 | 0.002 ppm | 33M1W7D | ||||||||||||||||||||||||||||||||||
2 | 8 | 27 | 1720 | 1770 | 0.246 | 0.0023 ppm | 18M4G7D | ||||||||||||||||||||||||||||||||||
2 | 81 | 27 | 1720 | 1770 | 0.2113 | 0.0023 ppm | 18M5W7D | ||||||||||||||||||||||||||||||||||
2 | 82 | 27 | 1720 | 1770 | 0.208 | 0.0023 ppm | 18M4W7D | ||||||||||||||||||||||||||||||||||
2 | 83 | 27 | 1717.5 | 1772.5 | 0.2208 | 0.0023 ppm | 13M5W7D | ||||||||||||||||||||||||||||||||||
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
3 | 1 | 15B |
some individual PII (Personally Identifiable Information) available on the public forms may be redacted, original source may include additional details
This product uses the FCC Data API but is not endorsed or certified by the FCC