Table of Contents

Advertisement

Quick Links

USER'S MANUAL

Advertisement

Table of Contents
loading

Summary of Contents for Acer PT315-53

  • Page 1 USER’S MANUAL...
  • Page 2 System version. Images provided herein are for reference only and may contain information or features that do not apply to your computer. Acer Group shall not be liable for technical or editorial errors or omissions contained in this manual. Register your Predator product...
  • Page 3: Table Of Contents

    Table of contents - 3 A B L E O F C O N T E N T S First things first PredatorSense and Acer Your guides ........... 6 TrueHarmonyTM settings ....46 Basic care and tips for using your Boot logo customization......
  • Page 4 4 - Table of contents Universal Serial Bus (USB) How do I unlock my computer?..81 How do I set the alarm?......83 USB Type-C port Where are my apps?........ 84 What is a Microsoft ID (account)?.. 85 Thunderbolt 4 port How do I check for Windows Displays ............
  • Page 5 Getting started... In this section you will find: • Useful information on caring for your computer and your health • Where to find the power button, ports and connectors • Tips and tricks for using the touchpad and keyboard • How to create recovery backups •...
  • Page 6: First Things First

    Once you have connected to the internet, you can download updates for your computer from: http://go.acer.com/?id=17883 1. The link will open the Predator Support webpage. 2. Scroll down to Drivers and Manuals and search for your model by pasting in or manually entering the serial number, SNID, or product model.
  • Page 7: Basic Care And Tips For Using Your Computer

    Taking care of your computer Your computer will serve you well if you take care of it. • Only use the adapter provided with your device, or an Acer- approved adapter to power your device. • Do not expose the computer to direct sunlight. Do not place it near sources of heat, such as a radiator.
  • Page 8: Taking Care Of Your Ac Adapter

    1. Turn off the computer. 2. Disconnect the AC adapter. 3. Use a soft, moist cloth. Do not use liquid or aerosol cleaners. If your computer is dropped or visibly damaged, or does not work normally, please contact your nearest authorized Acer service center.
  • Page 9: Guidelines For Safe Battery Usage

    • The charging port must be clean and free from debris and should only be used with Acer charging equipment. Use of a non-Acer battery or charging equipment can cause damage to the product and will void the warranty.
  • Page 10 • Device with removable battery: The battery should only be replaced with parts approved by Acer. Do not replace the battery with any parts other than approved ones. This notebook uses a Lithium-based battery. Do not use it in a humid, wet or corrosive environment.
  • Page 11 Batteries may also explode if damaged. Dispose of batteries according to local regulations. Please recycle when possible. Do not dispose as household waste. Wireless devices may be susceptible to interference from the battery, which could affect performance. Note Please refer to www.acer.com for battery shipping documents.
  • Page 12: Internal Battery

    12 - First things first Internal battery • Do not attempt to replace a built-in rechargeable battery, battery replacement must be done by an Acer- authorized repair facility. Recharge the battery by following the instruction included in the product documentation.
  • Page 13: Your Predator Notebook Tour

    Your Predator notebook tour - 13 O U R R E D A T O R N O T E B O O K T O U R After setting up your computer as illustrated in the Setup Guide, let us show you around your new Predator computer. Screen view Icon Item Description...
  • Page 14: Keyboard View

    14 - Your Predator notebook tour Icon Item Description Indicates the computer’s battery status. Battery Amber when the battery is indicator charging. Blue when fully charged (with the AC adapter plugged in). Power Indicates the computer’s power indicator status. Keyboard view Icon Item Description...
  • Page 15 Your Predator notebook tour - 15 Icon Item Description Touch-sensitive pointing device. The touchpad and selection buttons form a single surface. Press down firmly on the Touchpad touchpad surface to perform a left click. Press down firmly on the lower right corner to perform a right click.
  • Page 16: Left View

    16 - Your Predator notebook tour Left view Icon Item Description Kensington Connects to a Kensington- lock slot compatible security lock. Allows the computer to stay Ventilation and cool. cooling fan Do not cover or obstruct the openings. Connects to an Ethernet 10/ 100/1000Mbps/2.5Gbps- Ethernet (RJ- based network.
  • Page 17: Right View

    Your Predator notebook tour - 17 Right view Icon Item Description Connects to USB devices with a USB Type-C / USB Type-C connector. Thunderbolt 4 Supports Thunderbolt 4 and ™ port displays. USB port with power-off Connects to USB devices. charging Supports high-definition digital HDMI 2.1 port...
  • Page 18: Rear View

    18 - Your Predator notebook tour • Defined by the USB 3.2 Gen 2 specification (SuperSpeed USB). Rear view Icon Item Description Connects to an AC adapter. DC-in jack Note: Please press the AC adapter into the tunnel to the power connector.
  • Page 19: Base View

    Your Predator notebook tour - 19 Base view Icon Item Description Allows the computer to stay Ventilation and cool. cooling fan Do not cover or obstruct the openings. Speakers Deliver stereo audio output.
  • Page 20: Using The Keyboard

    20 - Using the keyboard S I N G T H E K E Y B O A R D The keyboard has full-sized keys, a numeric keypad, separate cursor, lock, Windows keys and hotkeys. Lock keys The keyboard has lock keys which you can use to turn keyboard functions on and off.
  • Page 21 Using the keyboard - 21 Hotkey Icon Function Description Turns the display screen Fn + F6 Display off backlight off to save power. Press any key to return. Microphone Turns the microphones on Fn + F7 toggle and off. Speaker Turns the speakers on and Fn + F8 toggle...
  • Page 22: Windows Keys

    22 - Using the keyboard Windows keys The keyboard has two keys that perform Windows-specific functions. Description Pressed alone it returns to the Start Windows key screen or to return to the last open app. This key has the same effect as Application key clicking the right mouse button.
  • Page 23: Using The Precision Touchpad

    Using the Precision Touchpad - 23 S I N G T H E R E C I S I O N O U C H P A D The touchpad controls the arrow (or 'cursor') on the screen. As you slide your finger across the touchpad, the cursor will follow this movement.
  • Page 24 24 - Using the Precision Touchpad Two-finger pinch Zoom in and out of photos, maps and documents with a simple finger-and-thumb gesture. Three-finger press Lightly tap the touchpad with three fingers to open the Search Windows. Three-finger swipe Swipe across the touchpad with three fingers. •...
  • Page 25: Changing Touchpad Settings

    Using the Precision Touchpad - 25 The precision touchpad includes added technology features that help recognize and prevent unintentional gestures such as accidental taps, gestures, and pointer movement. Note The touchpad is sensitive to finger movement; the lighter the touch, the better the response. Please keep the touchpad and your fingers dry and clean.
  • Page 26 26 - Using the Precision Touchpad a mouse. Or you can adjust the touchpad sensitivity to suit your needs. Scroll down to see more settings.
  • Page 27: Recovery

    Predator provides Acer Care Center, which allows you to reset your PC, refresh your PC, backup files/data or create a factory default backup. If you cannot access Acer Care Center, click Settings in the Start menu, select Update & Security and then click Recovery.
  • Page 28 28 - Recovery 3. Plug in the USB drive (or a portable external hard drive) and click + to add a drive. Select the USB drive from the drop-down list. 4. Click More options to select back-up options which best fit your needs, such as schedule the backup interval, how long you want to keep those backups (default is Forever), which folders to be backed up or be excluded.
  • Page 29: Creating A Factory Default Backup

    Recovery - 29 6. Unplug the USB drive (or a portable external hard drive) and label it clearly. Important Write a unique, descriptive label on the backup, such as 'File History Recovery Backup'. Make sure you keep the backup in a safe place that you will remember.
  • Page 30 30 - Recovery 3. Plug in the USB drive and wait for the PC to detect the USB drive then click Next. 4. Everything on the drive will be deleted. Click Create to continue. 5. You will be shown the backup progress on the screen. 6.
  • Page 31: Backing Up Your Wireless And Lan Drivers

    Recovery - 31 Important Write a unique, descriptive label on the backup, such as 'Windows Recovery Backup'. Make sure you keep the backup in a safe place that you will remember. Note Since the recovery backup requires at least 8 GB of storage after formatting, it is recommended to use a USB drive with a capacity of 16 GB or larger.
  • Page 32 32 - Recovery 2. Select the Restore tab and click Get started to open the Recovery window. 3. Click Get started to Choose an option. Select Keep my files to refresh your PC and reinstall your operating...
  • Page 33 Recovery - 33 system without removing your personal files. Click Next to continue. Important If you have apps installed on your PC, they will be removed. If you'd like not to restore apps and setting that came with your PC, go to Change settings and turn off the option to not restore preinstalled apps that came with this PC before proceeding the restore progress.
  • Page 34: Reset This Pc And Remove Everything

    34 - Recovery 4. Resetting the PC will reinstall Windows, change settings back to their factory defaults and remove all preinstalled apps and programs without removing your personal files. Click Reset to continue. This will take a while and your PC will restart.
  • Page 35 Recovery - 35 2. Select the Restore tab and click Get Started to open the Recovery window.
  • Page 36 36 - Recovery 3. Click Get started to Choose an option. Select Remove everything to reset your PC back to its factory default. 4. Click Change settings to choose restore settings which best fit your needs. Then click Confirm to continue.
  • Page 37 Recovery - 37 Make sure all settings are properly made, c lick Next to continue. Warning Turn on "Clean data" will remove all of your personal files and accounts, along with pre-existing drivers that may affect your Windows installation. 6. Click Reset to continue. 7.
  • Page 38: 38 - Using A Bluetooth Connection

    38 - Using a Bluetooth connection S I N G A L U E T O O T H C O N N E C T I O N Bluetooth is a technology enabling you to transfer data wirelessly over short distances between many different types devices.
  • Page 39 Using a Bluetooth connection - 39 2. Click on Add Bluetooth or other device then select the device that you want to add. 3. Your computer will automatically start searching for devices, as well as make itself visible to other devices. 4.
  • Page 40 40 - Using a Bluetooth connection You can also enter the Bluetooth settings by selecting the Notifications icon in the lower right-hand corner of the screen to open the Notifications pane. From here, you can enable or disable Bluetooth or right-click on Bluetooth > Go to Settings to enter the Bluetooth settings.
  • Page 41: Connecting To The Internet

    Connecting to the Internet - 41 O N N E C T I N G T O T HE N T E R N E T This chapter includes general information on types of connections, and getting connected to the internet. For detailed information, please refer to Network connections on page 91.
  • Page 42 42 - Connecting to the Internet Predator notebook computers feature a Flight mode hotkey that turns the network connection on or off. You can use the network management options to turn your wireless network on/off or control what is shared over the network. To connect to a wireless network, please follow the steps below.
  • Page 43 Connecting to the Internet - 43 4. Once you select a wireless network, select Connect. 5. If required, enter the network’s password.
  • Page 44: Connecting With A Cable

    44 - Connecting to the Internet Connecting with a cable Built-in network feature If your computer has a network port, plug one end of a network cable into the network port on your computer, and the other end into a port on your router (refer to the image below.) Then, you'll be ready to get online.
  • Page 45: Predatorsense

    PredatorSense - 45 R E D A T O R E N S E PredatorSense allows you to switch operating modes and control fan behavior. Multiple profiles allow you to quickly switch between lighting schemes. also allows monitor system performance, synchronize the key function settings for a specific game and launch/uninstall your apps quickly.
  • Page 46: Predatorsense And Acer Trueharmonytm Settings

    Turn keyboard backlight off automatically if no action within 30 seconds. You can disable/enable system boot animation & sound, sticky keys, Windows and menu keys or change temperature units. To get a different audio experience, you can click Acer TrueHarmony icon to adjust the audio mode.
  • Page 47: Boot Logo Customization

    PredatorSense - 47 Boot logo customization Click the Notebook icon then Browse to select your preferred image to customize the boot logo. Planet9 website Click the Planet9 icon and select Join Now to connect the Planet9 website...
  • Page 48: Adjusting The Keyboard Backlight

    48 - PredatorSense Adjusting the keyboard backlight Select Lighting to see keyboard lighting options. Static lighting The keyboard backlight is divided into four zones, which you can turn on or off independently. In each zone, you can choose a custom color from the color square. Click the slider under each zone to turn the backlight on or off for that zone.
  • Page 49: Creating A Lighting Profile

    PredatorSense - 49 Each effect provides an animation for the backlight colors, which either repeats a pattern. Creating a Lighting Profile You can create profiles for lighting schemes and switch instantly using the menus on the main page, or in the Lighting page.
  • Page 50: Operating Mode

    50 - PredatorSense Operating Mode You can optimize your laptop with different modes using the menu on the main page, or select the Mode tab for more information. Four modes are available: Quiet: Keep the PC as quiet as possible. For light use, such as meetings, E-learning or browsing.
  • Page 51: Fan Control

    PredatorSense - 51 Fan control You may adjust the performance of the fans cooling your computer’s CPU and GPU. Three levels are available: Auto(default), Max and Custom. If you select Custom, then you will see two sliders that allow you to set CPU and GPU cooling independently.. Monitoring From Monitoring page, click CPU/GPU or System tab to check processor and system temperature and loading.
  • Page 52: Game Sync Settings

    52 - PredatorSense Game Sync settings Use Game Sync to save the settings for different games.The settings includes behavior, lighting profile, AcerTrueHarmony mode and overclocking levels. The settings will be switched automatically when the game is launched. Select Add Game to create a new game setting on lower right page.
  • Page 53: App Center

    PredatorSense - 53 App Center App Center is a great way to quickly launch the installed app in your computer. To add the app, select Add App in the lower right page. Click Browse to select the execution file (.exe) of the app and click Add to finish. Then, you can double click the app icon to run the application directly.
  • Page 54: 54 - Bluelight Shield

    54 - Bluelight Shield L U E L I G H T H I E L D The Bluelight Shield can be enabled to reduce blue-light emissions from the screen to protect your eyes. To configure the Bluelight Shield, search for ’Quick Access’ in the Start Menu.
  • Page 55 Keeping your computer and data safe... In this section you will find: • How to secure your computer • Setting passwords • What you need to prepare when you’re traveling • How to get the most out of your battery...
  • Page 56: Securing Your Computer

    56 - Securing your computer E C U R I N G Y O U R C O M P U T E R Your computer is a valuable investment that you need to take care of. Learn how to protect and take care of your computer.
  • Page 57: Entering Passwords

    Securing your computer - 57 password checkpoints on boot-up and resume from Hibernation (if available) for maximum security. Important Do not forget your Supervisor Password! If you forget your password, please get in touch with your dealer or an authorized service center.
  • Page 58: Bios Utility

    58 - BIOS utility B I O S U T I L I T Y The BIOS utility is a hardware configuration program built into your computer's BIOS. Your computer is already properly configured and optimized, and you do not normally need to run this utility. However, if you encounter configuration problems, you may need to run To activate the BIOS utility, press F2 while the computer logo is being displayed.
  • Page 59: Power Management

    Power management - 59 O W E R M A N A G E M E N T This computer has a built-in power management unit that monitors system activity. System activity refers to any activity involving one or more of the following devices: keyboard, mouse, hard disk, peripherals connected to the computer, and video memory.
  • Page 60 60 - Power management 4. Select Change settings that are currently unavailable. 5. Scroll down and disable Turn on fast startup. 6. Select Save changes.
  • Page 61: Battery Pack

    Battery pack - 61 A T T E R Y P A C K The computer uses an embedded Lithium battery that gives you long use between charges. Battery characteristics The battery is recharged whenever you connect the computer to the AC adapter. Your computer supports charge-in-use, enabling you to recharge the battery while you continue to operate the computer.
  • Page 62: Optimizing Battery Life

    62 - Battery pack 6. Reconnect the AC adapter and fully charge the battery again. Follow these steps again until the battery has been charged and discharged three times. Use this conditioning process for all new batteries, or if a battery hasn't been used for a long time.
  • Page 63: Checking The Battery Level

    Battery pack - 63 • Store your PC in a cool, dry place. The recommended temperature is 10° C (50° F) to 30° C (86° F). Higher temperatures cause the battery to self-discharge faster. • Excessive recharging decreases the battery life. •...
  • Page 64: 64 - Traveling With Your Computer

    64 - Traveling with your computer R A V E L I N G W I T H Y O U R C O M P U T E R This section gives you tips and hints to consider when moving around or traveling with your computer.
  • Page 65: What To Bring To Meetings

    Traveling with your computer - 65 You can put the computer in Sleep mode by pressing the Sleep hotkey or by closing the display. When you are ready to use the computer again, open the display and, if necessary, press and release the power button.
  • Page 66: What To Take With You

    66 - Traveling with your computer • Pack the computer in a protective case that can prevent the computer from sliding around and cushion it if it should fall. Warning Avoid packing items next to the top cover of the computer. Pressure against the top cover can damage the screen.
  • Page 67: Traveling With The Computer

    Traveling with your computer - 67 With a second AC adapter, you can avoid carrying the extra weight to and from home. If you use your computer at home for significant periods of time, you might also want to add an external keyboard, monitor or mouse.
  • Page 68: Traveling Internationally

    68 - Traveling with your computer • If possible, have the computer inspected by hand. Airport security X-ray machines are safe, but do not put the computer through a metal detector. Traveling internationally Important Check with your airline for any special requirements for travelling with Lithium batteries.
  • Page 69 Traveling with your computer - 69 compatible with the local AC voltage. Do not use converter kits sold for appliances to power the computer. • If you are using the modem, check if the modem and connector are compatible with the telecommunications system of the country you are traveling in.
  • Page 70 Ports and connectors... In this section you will find: • Information on the ports and connectors fitted to your computer...
  • Page 71: Universal Serial Bus (Usb)

    Universal Serial Bus (USB) - 71 (USB) N I V E R S A L E R I A L The USB port is a high-speed port which allows you to connect USB peripherals, such as a mouse, an external keyboard, additional storage (external hard disks), or any other compatible device.
  • Page 72: 72 - Usb Type-C Port

    72 - USB Type-C port U S B T Y P E P O RT A USB Type-C port is a connector that allows you to easily connect USB Type-C peripherals, such as additional storage (e.g. an external drive), or any other compatible device. The Type-C port is reversable;...
  • Page 73: Thunderbolt 4 Port

    Thunderbolt 4 port - 73 H U N D E R B O L T P O R T A Thunderbolt 4 port allows you to easily connect devices with a Type-C connector to your computer, such as additional storage (e.g. an external drive), displays, other...
  • Page 74: 74 - Video And Audio Connectors

    74 - Video and audio connectors I D E O A N D A U D I O C O N N E C T O R S Add an external monitor to your computer via a video port. The type of port available depends on your computer’s configuration.
  • Page 75: Hdmi

    HDMI - 75 H D M I HDMI (High-Definition Multimedia Interface) is a high- quality, digital audio/video interface. HDMI allows you to connect any compatible digital audio/video source, such as your computer, a set-top box, DVD player, and audio/video receiver to any compatible digital audio and/or video monitor, such as a digital television (DTV) with a single cable.
  • Page 76 Got a question? In this section you will find: • Frequently asked questions • Tips for using Windows 10 • Troubleshooting information • How to protect yourself while online • Where to find Acer service center contact information...
  • Page 77: Frequently Asked Questions

    Frequently asked questions - 77 R E Q U E N T L Y A S K E D Q U E S T I O N S The following is a list of possible situations that may arise during the use of your computer. Easy solutions are provided for each one.
  • Page 78 78 - Frequently asked questions • The computer may be in Sleep or Hibernate mode (if there is a power LED, it will flash). Press and release the power button to resume. No audio is heard from the computer. Check the following: •...
  • Page 79: Requesting Service

    Attach your proof-of-purchase to the ITW passport. If the country you are traveling in does not have an Acer- authorized ITW service site, you can still get in contact with...
  • Page 80 Before you call Please have the following information available when you call Acer for online service, and please be at your computer when you call. With your support, we can reduce the amount of time a call takes and help solve your problems efficiently.
  • Page 81: Tips And Hints For Using Windows 10

    F r e q u e nt l y a sk Frequently asked questions - 81 Tips and hints for using Windows 10 We know this is a new operating system that will take some getting used to, so we've created a few pointers to help you get started.
  • Page 82 82 - Frequently asked questions Can I personalize the Lock screen? You can personalize the lock screen with a different image, to run a slideshow of images, or to show you quick status and notifications to suit your personal needs. To change the background, press the Windows key or select Windows Start...
  • Page 83: How Do I Set The Alarm

    Frequently asked questions - 83 Can I make tiles bigger or smaller? Yes, you can. Right-click on a tile and select Resize. Select a size from the menu that appears. Can I change the screen resolution? Yes, you can. Move your cursor to the lower left-hand corner of the screen and type 'Resolution' in the text box to display the results;...
  • Page 84: Where Are My Apps

    84 - Frequently asked questions 8. Select On or Off to activate or deactivate the alarm. Hour Minutes Save Delete Note The alarm will only sound if your computer is awake at the set time. Where are my apps? Move your cursor to the lower left-hand corner of the screen and click search box, start typing the name of the app you would like to open.
  • Page 85: What Is A Microsoft Id (Account)

    Frequently asked questions - 85 How do I install apps? You will need to have a Microsoft ID to purchase and download apps from Microsoft Store. I can't find apps like Notepad and Paint! Where are they? Move your cursor to the lower left-hand corner of the screen and click search box.
  • Page 86: Where Can I Get More Information

    86 - Frequently asked questions Where can I get more information? For more information please visit the following pages: • Windows 10 information: www.microsoft.com • Support FAQs: support.acer.com...
  • Page 87: Troubleshooting

    F r eq ue n tl y as k ed qu est io ns Frequently asked questions - 87 Troubleshooting This chapter shows you how to deal with common system problems. Read it before calling a technician if a problem occurs. Solutions to more serious problems require opening up the computer.
  • Page 88 88 - Frequently asked questions Error messages Corrective action Hard disk 0 Contact your dealer or an authorized extended type service center. error Contact your dealer or an authorized I/O parity error service center. Keyboard error or Contact your dealer or an authorized no keyboard service center.
  • Page 89: Internet And Online Security

    Internet and online security - 89 N T E R N E T A N D O N L I N E S E C U R I T Y First steps on the net Protecting your computer It is vital to protect your computer from viruses and attacks over the internet (see Internet security software on page 93).
  • Page 90 90 - Internet and online security Dial-up Some computers include a telephone dial-up (‘modem’) connector. This allows you to connect to the internet using your telephone line. With a dial-up connection, you cannot use the modem and the telephone simultaneously on a single phone line.
  • Page 91: Network Connections

    Internet and online security - 91 internet while away from home. The socket for a SIM card may be built in to your computer, or may require an external device, such as a USB modem or even an appropriately equipped mobile phone. Note If your computer includes a SIM card slot, you require a compatible SIM card and a contract with a cellular provider.
  • Page 92 92 - Internet and online security Components of a wireless LAN To set up your Wireless network at home you need to have the following: Access point (router) Access points (routers) are two-way transceivers that broadcast data into the surrounding environment. Access points act as a mediator between wired and wireless network.
  • Page 93: Surf The Net

    Predator website To get you started why not visit our website, www.acer.com. Predator is dedicated to provide you with on-going personalized support. Check out our Support section to get help tailored to your needs.
  • Page 94 94 - Internet and online security Staying ahead of cybercriminals Stay ahead of hackers and cybercriminals by understanding the tactics they use to access your private data. Ensure your software is up to date Cybercriminals rely heavily upon software or platform vulnerabilities, as they are the easiest way to sneak malware into a user's device unnoticed, sometimes with little action user's...
  • Page 95 Internet and online security - 95 personal information like social security or credit card numbers to someone that you don't know over the phone. Common threats cybercriminals use Now you know a few very common ways cybercriminals try to sneak onto your device or trick you into providing private information to them directly.
  • Page 96 96 - Internet and online security device is entirely under the control of the person who created the botnet. Most people who are infected with botnets aren't even aware that their computer's security has become compromised! What to do if you're infected: If you're infected you probably don't realize it as bots are notoriously quiet.
  • Page 97 Internet and online security - 97 programmed to "listen in" on transmissions, intercept data that is specifically targeted as valuable, and capture the data, such as your login credentials and passwords. Use a virtual private network (VPN) to ensure your privacy and anonymity are protected when you use public Wi-Fi.
  • Page 98 98 - Internet and online security programs do not work correctly, your computer may be infected by malicious software. However, do not blame every computer problem on a virus! If you suspect your computer is infected, the first thing to do is update, if you have not already done so, and run your antivirus and anti-spyware software.

This manual is also suitable for:

Predator triton 300A2/nh.qdtek.001

Table of Contents