Packard Bell EasyNote LV User Manual

Packard Bell EasyNote LV User Manual

Easynote lv packard bell
Hide thumbs Also See for EasyNote LV:
Table of Contents

Advertisement

User's Manual
Packard Bell EasyNote LV
- 1

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the EasyNote LV and is the answer not in the manual?

Questions and answers

Summary of Contents for Packard Bell EasyNote LV

  • Page 1 User’s Manual Packard Bell EasyNote LV...
  • Page 2: Table Of Contents

    Using Windows and your software ....41 Internet security offer ....... 41 Computer Basics Productivity software ........ 41 Safety and comfort ..........8 Packard Bell Recovery Management..42 Safety precautions ........8 Internet Health precautions ........11 First steps on the net ........43 Getting to know your computer Protecting your computer ......
  • Page 3: Table Of Contents

    Where are my apps?......... 85 Index What is a Microsoft ID (account)?..... 87 Copyright © 09/2012. All Rights Reserved. Packard Bell EasyNote LV User’s Manual This revision: 3 September 2012 Visit registration.packardbell.com and discover the benefits of being a customer of Packard Bell.
  • Page 4: Starting Your Computer

    T A R T I N G Y O U R COMPUTER Thank you for purchasing this Packard Bell computer! This guide has been designed to introduce you to the features of your computer and assist in your computing experience.
  • Page 5: Registration

    Another option Another way to register your Packard Bell product is to visit our website at registration.packardbell.com. Choose your country and follow the simple instructions.
  • Page 6: Software Installation

    Packard Bell. AVING TROUBLE Packard Bell provides several options to support your purchase. Packard Bell support Make sure you write down your computer serial number, date and place of purchase and model name on the area provided in this guide;...
  • Page 7 Warranty and contact information You can find information about the warranty for your computer and how to contact technical support in your computer’s Warranty. Starting your computer - 7...
  • Page 8: Computer Basics

    OMPUTER ASICS AFETY AND COMFORT Safety precautions Please follow the guidelines below to use your computer comfortably and to avoid health problems. Computer environment Make sure that the computer: • Is used on a stable surface, stand or table. A fall can seriously damage the computer.
  • Page 9 Please note • Slots and openings are provided for ventilation to ensure reliable operation of the product and to protect it from overheating. These openings must not be blocked or covered. The openings should never be blocked by placing the product on a bed, sofa, rug or other similar surface.
  • Page 10 • The power cable is connected to the computer before connecting the power cable to the AC power outlet. • The power cable is unplugged from the power outlet before disconnecting the power cable from the computer. • Three-pin power cords are connected to a grounded power outlet. •...
  • Page 11: Health Precautions

    protect unused slots from dust, metal objects or other particles. Save the dummies for use when no cards are in the slots. Servicing your computer Do not attempt to service your computer yourself, as opening or removing covers may expose you to dangerous voltage or other risks. Refer all servicing to qualified service personnel.
  • Page 12 • Your device and its enhancements may contain small parts. Keep them out of the reach of small children. • The computer and accessories may contain small parts. Keep them out of the reach of small children. • If you work or play for hours at a time, then make sure you take regular breaks.
  • Page 13 • Ensure that the computer’s ventilation slots and openings are never obstructed or covered. Do not place the computer on a soft surface (such as a carpet, chair or bed) that may block ventilation slots. • Do not push objects of any kind into ventilation or case slots as they may touch dangerous voltage points or short-out parts that may result in a fire or electric shock.
  • Page 14: 14 - Getting To Know Your Computer

    ETTING T O KNOW Y O U R COM PU T E R After setting up your computer, as illustrated in the setup instructions, let us show you around your new Packard Bell computer. Packard Bell EasyNote LV 14 - Getting to know your computer...
  • Page 15: Top View - Display

    OP VIEW DISPLAY Icon Item Description Microphone Internal microphone for sound recording. Also called Liquid-Crystal Display (LCD), Display screen displays computer output. Web camera for video communication. Webcam A light next to the Webcam indicates that the webcam is active. Getting to know your computer - 15...
  • Page 16: Top View - Keyboard

    OP VIEW KEYBOARD Icon Item Description Power button / Turns the computer on and off. Indicates the indicator computer's power status. For entering data into your computer. Keyboard - Special keys are described on page 17. Touch-sensitive pointing device which Touchpad functions like a computer mouse.
  • Page 17: Special Keys

    Icon Item Description Click buttons (left The left and right side of the button function as and right) left and right selection buttons. Speakers Deliver stereo audio output. - Note: The front panel indicators are visible even when the computer cover is closed. Special keys Your computer’s keyboard includes keys that activate special functions.
  • Page 18 Icon Function Description Turns the display screen backlight off to save power. Screen blank Press any key to return. Touchpad toggle Turns the internal touchpad on and off. Play/Pause Play or pause a selected media file. Stop Stop playing the selected media file. Previous Return to the previous media file.
  • Page 19 Icon Function Description Speaker toggle Turns the speakers on and off. Hotkeys The computer uses hotkeys (key combinations) to access function keys and navigation commands. To activate hotkeys, press and hold the Fn key (bottom left) before pressing the other key in the hotkey combination. Hotkey Function Description...
  • Page 20: Touchpad

    Touchpad The touchpad controls the arrow on the screen; called the pointer or the cursor. When you slide your finger across the touch-sensitive pad, the pointer will follow this movement. Multi-gesture The touchpad supports Multi-gesture commands; it can recognise patterns that use more than one finger.
  • Page 21: Front View

    RONT VIEW Icon Item Description Power indicator Indicates the computer's power status. Indicates the computer's battery status. - Charging: The light shows amber when the Battery indicator battery is charging. - Fully charged: The light shows blue when in AC mode. HDD indicator Indicates when the hard disk drive is active.
  • Page 22: Left View

    EFT VIEW Icon Item Description Connects to a Kensington-compatible Kensington lock slot computer security lock. - Wrap the computer security lock cable around an immovable object such as a table or handle of a locked drawer. Insert the lock into the notch and turn the key to secure the lock.
  • Page 23: Right View

    Icon Item Description Connect to USB devices (e.g., USB mouse, USB camera). USB port - If a port is black, it is USB 2.0 compatible, if a port is blue (optional) it is also USB 3.0 compatible. IGHT VIEW Icon Item Description Microphone jack...
  • Page 24 Icon Item Description Connect to USB devices (e.g., USB mouse, USB camera). USB port - If a port is black, it is USB 2.0 compatible, if a port is blue (optional) it is also USB 3.0 compatible. Optical drive Internal optical drive; accepts CDs or DVDs. Optical disk access Lights up when the optical drive is active.
  • Page 25: Base View

    ASE VIEW Icon Item Description Battery bay Houses the computer's battery pack. Releases the battery for removal. Insert a Battery release latch suitable tool and slide to release. Memory Houses the computer's main memory. compartment Houses the computer's hard disk (secured with Hard disk bay screws).
  • Page 26: Upgrading Your Computer Expanding Through Options

    PGRADING YOUR COMPUTER XPANDING THROUGH OPTIONS Your computer offers you many options for a complete computing experience. Connectivity options Ports allow you to connect peripheral devices to your computer. For instructions on how to connect different external devices to the computer, read the following section.
  • Page 27 to use a program to access the contents of the card. Select an option here if it is appropriate, otherwise select Cancel. If the card contains no files, or unknown files, a window will open showing the contents of the card.
  • Page 28 Built-in networking The built-in networking allows you to connect your computer to an Ethernet-based network. Connect an Ethernet cable from the Ethernet (RJ-45) port on the chassis of the computer to a network jack or hub on your network. Universal Serial Bus (USB) The USB port is a high-speed serial bus which allows you to connect USB peripherals without taking up system resources.
  • Page 29 Video port Connect to a monitor with a VGA or DVI port (the type of connection supported depends on your computer’s configuration). The appropriate cable is usually included with the monitor. Follow these steps to connect an monitor to your computer: 1.
  • Page 30 High-Definition Multimedia Interface (only for certain models) HDMI (High-Definition Multimedia Interface) is an industry-supported, uncompressed, all-digital audio/video interface. HDMI provides an interface between any compatible digital audio/ video source, such as a set-top box, DVD player, and A/V receiver and a compatible digital audio and/or video monitor, such as a digital television (DTV), over a single cable.
  • Page 31: Power Supply

    OWER SUPPLY POWER ADAPTER Your computer can use the supplied external power adapter (a power 'brick') to run on AC power. A power cable is provided that is appropriate for the country where the computer was purchased. The power adapter provides adequate power to run your computer and recharge the battery pack at the same time.
  • Page 32: Battery Pack

    Warning: The AC adapter and the underside of the computer can become hot after prolonged use. This is normal, but may cause injury with prolonged contact. ATTERY PACK The computer uses a battery pack that gives you extended use between charges.
  • Page 33 To maximize your battery’s life, you are advised to adhere to the recommendations set out below. Conditioning a new battery pack Before you use a battery pack for the first time, there is a “conditioning” process that you should follow: 1.
  • Page 34: Replacing The Battery Pack

    In addition, the useful lifespan of the battery is adversely affected by the following usage patterns: • Using the computer on constant AC power with the battery inserted. If you want to use constant AC power, you are advised to remove the battery pack after it is fully charged.
  • Page 35: Charging The Battery

    To install a battery pack: 1. Align the battery with the open battery bay; make sure that the end with the contacts will enter first, and that the top surface of the battery is facing up. 2. Slide the battery into the battery bay and gently push until the battery locks in place.
  • Page 36: Optimizing Battery Life

    Optimizing battery life Optimizing battery life helps you get the most out of battery operation, prolonging the charge/recharge cycle and improving recharging efficiency. You are advised to follow the suggestions set out below: • Purchase an extra battery pack. • Use AC power whenever possible, reserving battery for on-the-go use. •...
  • Page 37 When the battery-low warning appears, the recommended course of action depends on your situation: Situation Recommended Action The AC adapter and 1. Plug the AC adapter into the computer, and then a power outlet are connect to the mains power supply. available.
  • Page 38: Power Management

    OWER MANAGEMENT This computer has a built-in power management unit that monitors system activity. System activity refers to any activity involving one or more of the following devices: keyboard, mouse, hard disk, peripherals connected to the computer, and video memory. If no activity is detected for a period of time, the computer stops some or all of these devices in order to conserve energy.
  • Page 39 1. Open the Desktop. 2. Click Power Options in the Notification area. 3. Select More Power Options. 4. Select Choose what the power buttons do. 5. To access Shutdown Settings, select Change settings that are currently unavailable. Power management - 39...
  • Page 40 6. Scroll down and disable Turn on fast startup. 7. Select Save changes. 40 - Power management...
  • Page 41: Software

    OF T WA RE SING INDOWS AND YOUR SOFTWARE Packard Bell computers include software to help you use your computer; the programs and categories available on your computer depend on the model purchased. Internet security offer It is vital to protect your computer from viruses and attacks over the Internet (see Security on page 49).
  • Page 42: Packard Bell Recovery Management

    Packard Bell Recovery Management To prepare your computer for system recovery options, you should create a set of recovery discs as soon as possible. See page 59 for more information. 42 - Software...
  • Page 43: Internet

    NTERNET IRST STEPS ON THE NET Protecting your computer It is vital to protect your computer from viruses and attacks over the Internet (see Internet security offer on page 25 and Security on page 49). A comprehensive Internet security program is offered when you first start your computer.
  • Page 44 Connection types Depending your computer model, your location your communication needs, you have several ways to connect to the Internet. Dial-up Some computers include a telephone dial-up (‘modem’) connector. This allows you to connect to the Internet using your telephone line. With a dial- up connection, you cannot use the modem and the telephone simultaneously on a single phone line.
  • Page 45: Network Connections

    Cable A cable connection provides fast and always-on Internet service via a cable television line. This service is generally available in large cities. You can use your telephone and watch cable TV at the same time you are connected to the Internet. 3G (WWAN or 'Wireless Wide-Area Network') A 3G connection allows you to use cellular networks (such as those used by a mobile phone) to connect to the Internet while away from home.
  • Page 46 Wireless networks A wireless LAN or WLAN is a wireless local area network, which may link two or more computers without using wires. Setting up a wireless network is easy and allows you to share files, peripheral devices and an Internet connection.
  • Page 47 router with the subscription to their services. Read carefully the documentation supplied with your Access point/router for detailed setup instructions. Network cable (RJ45) A network cable (also called RJ45 cable) is used to connect the host computer to the access point (see illustration below); this type of cable may also be used to connect peripheral devices to the access point.
  • Page 48 Diagram of a working network 1. Access point/router 2. Desktop computer 3. Modem 4. Printer 5. Portable computer 6. PDA/Smartphone 7. Network cables (RJ45) Turning on/off a wireless network connection Most computers feature a ‘WiFi’ button that turns the network connection on or off.
  • Page 49: Surf The Net

    Security You are probably eager to explore everything the Internet has to offer. In order for you to be safe online, Packard Bell has pre-installed Symantec’s award-winning Norton Internet Security™ on your computer. Internet - 49...
  • Page 50 Trojan horses, worms or spam can infect your computer in various ways, using up resources or clogging up a network. Note: Packard Bell guarantees that your computer was 100% virus free at the time of purchase and does not cover damages due to viruses.
  • Page 51 Spyware is sometimes used by unscrupulous companies to monitor and track the sites you visit on the Internet so as to determine your web-surfing habits and display targeted pop-up ads on your screen. However, some kinds of spyware go beyond simple tracking and actually monitor keystrokes and capture passwords, posing a serious security risk.
  • Page 52 How to protect your computer Cybercrime prevention can be straight-forward - when armed with a little technical advice and common sense, many attacks can be avoided. In general, online criminals are trying to make their money as quickly and easily as possible. The more difficult you make their job, the more likely they are to leave you alone and move on to an easier target.
  • Page 53 A complete version of Norton Internet Security™ is pre-installed on your Packard Bell system. It includes a free trial subscription to protection updates. Make sure you Activate it! Internet - 53...
  • Page 54 Choose strong passwords and keep them safe Passwords are a fact of life on the Internet today; we use them for everything from ordering flowers and online banking to logging into our favorite airline Web site to see how many miles we have accumulated. The following tips can help make your online experiences secure: •...
  • Page 55 goods. Since not divulging any personal information is rarely possible, the following list contains some advice for how to share personal information safely online: • Keep an eye out for phony email messages. Things that indicate a message may be fraudulent are misspellings, poor grammar, odd phrasing, Web site addresses with strange extensions, Web site addresses that are entirely numbers where there are normally words, and anything else out of the ordinary.
  • Page 56 sensitive data. Another sign that you have a secure connection is the small lock icon in the bottom of your web browser (usually the right-hand corner). • Pay attention to privacy policies on Web sites and in software. It is important to understand how an organization might collect and use your personal information before you share it with them.
  • Page 57 Review bank and credit card statements regularly The impact of identity theft and online crimes can be greatly reduced if you can catch it shortly after your data is stolen or when the first use of your information is attempted. One of the easiest ways to get the tip-off that something has gone wrong is by reviewing the monthly statements provided by your bank and credit card companies for anything out of the ordinary.
  • Page 58 correctly, your computer may be infected by malicious software. However, do not blame every computer problem on a virus! If you suspect your computer is infected, the first thing to do is update, if you have not already done so, and run your antivirus and anti-spyware software. 58 - Internet...
  • Page 59: Recovery

    Windows tools, or the recovery backup. Note: Packard Bell Recovery Management is only available with a pre-installed Windows operating system. Important: We recommend that you create a Recovery Backup and Drivers and Applications Backup and as soon as possible.
  • Page 60 1. From Start, type 'Recovery' and then click Packard Bell Recovery Management in the list of apps. 2. Click Create Factory Default Backup. The Recovery Drive window opens. 60 - Recovery...
  • Page 61 Make sure Copy contents from the recovery partition to the recovery drive is selected. This provides the most complete and safest recovery backup. 3. Plug in the USB drive then click Next. • Make sure your USB drive has enough capacity before continuing. The recovery backup requires at least 16 GB of storage 4.
  • Page 62: Creating A Drivers And Applications Backup

    7. Unplug the USB drive and label it clearly. Important: Write a unique, descriptive label on the backup, such as 'Windows Recovery Backup'. Make sure you keep the backup in a safe place that you will remember. REATING A DRIVERS AND APPLICATIONS BACKUP To create a Drivers and Applications Backup, that contains the factory- loaded software and drivers needed by your computer, you may use either a USB storage drive or, if your computer features a DVD recorder, one or...
  • Page 63 1. From Start, type 'Recovery' and then click Packard Bell Recovery Management in the list of apps. 2. Click Create Drivers and Applications Backup. Plug in the USB drive or insert a blank DVD into the optical drive, then click Next.
  • Page 64 • If you are using a USB drive, make sure your USB drive has enough capacity before continuing. • If using DVDs, it will also show the number of blank, recordable discs you will need to complete the recovery discs. Make sure that you have the required number of identical, blank discs.
  • Page 65: Recovering Your System

    3. Click Start to copy files.You will be shown the backup progress on the screen. 4. Follow the process until it completes: • If you are using optical discs, the drive ejects each disc as it completes burning it. Remove the disc from the drive and mark it with a permanent marker.
  • Page 66: Reinstalling Drivers And Applications

    solved by returning your system to a previous state when everything was working correctly. For instructions, see "Returning to an earlier system snapshot" on page 69. 3. Reset your operating system. If nothing else has solved the problem and you want to reset your system, but keep your user information, see "Returning your system to its factory condition"...
  • Page 67 If you are reinstalling using Windows and the recovery information stored on your computer: • From Start, type 'Recovery' and then click Packard Bell Recovery Management in the list of apps. • Click Reinstall Drivers or Applications. Recovery - 67...
  • Page 68 1. Insert the Drivers and Applications Backup into the disc drive or connect it to a free USB port. • If you inserted a DVD wait for Packard Bell Resource Center to start. • If Packard Bell Resource Center does not start automatically, press the Windows key + <E>, then double-click on the optical...
  • Page 69: Returning To An Earlier System Snapshot

    • If you are using a USB drive, press the Windows key + <E>, then double-click on the drive that contains the backup. Double-click on ResourceCenter. 2. You should see the Contents section of the Packard Bell Resource Center. 3. Click the install icon for the item you want to install, then follow the onscreen prompts to complete the installation.
  • Page 70: Returning Your System To Its Factory Condition

    Windows automatically creates an additional restore point each day, and also each time you install software or device drivers. Note: For more information about using Microsoft System Restore, from Start, type 'Help' and then click Help and Support in the list of apps.
  • Page 71: Recovering From Windows

    "Recovering from a recovery backup" on page 75. Recovering from Windows Start Packard Bell Recovery Management: • From Start, type 'Recovery' and then click Packard Bell Recovery Management in the list of apps. Two options are available, Restore Factory Settings (Reset my PC) or Customized Restore (Refresh my PC).
  • Page 72 Store). See "Customized Restore with Packard Bell Recovery Management" on page 74. Restore Factory Settings with Packard Bell Recovery Management 1. Click Restore Factory Settings. Caution: 'Restore Factory Settings' will erase all files on your hard drive. 2. If your computer is configured with two operating systems (only available on certain systems), a window opens with the option to restore either Windows 7 or Windows 8.
  • Page 73 3. The Reset your PC window opens. Images for reference only. 4. Click Next, then choose how to erase your files: a. Just remove my files quickly erases all files before restoring your computer and takes about 30 minutes. b. Fully clean the drive completely cleans the drive after each file is erased, so no files can be viewed after the recovery.
  • Page 74 Customized Restore with Packard Bell Recovery Management 1. Click Customized Restore (Retain User Data). 2. The Refresh your PC window opens. 3. Click Next, then Refresh. 4. The recovery process begins by restarting your computer, then continues by copying files to your hard drive. This process takes about 30 minutes.
  • Page 75: Recovering From A Recovery Backup

    Recovering from a recovery backup To recover from a recovery backup on a USB drive: 1. Find your recovery backup. 2. Plug in the USB drive and turn on your computer. 3. If it is not already enabled, you must enable the F12 Boot Menu: a.
  • Page 76 a. Click Advanced then System Restore to start Microsoft System Restore: Microsoft System Restore periodically takes a 'snapshot' of your system settings and saves them as restore points. In most cases of hard-to-resolve software problems, you can return to one of these restore points to get your system running again.
  • Page 77 Reset your PC from the recovery backup Caution: Reset your PC will erase all files on your hard drive. 1. The Reset your PC window opens. Images for reference only. 2. Click Next. 3. Select the operating system to recover (normally only one option is available).
  • Page 78 drive takes much longer, up to 5 hours, but is much more secure as old files are completely removed. 6. Click Reset. 7. After the recovery has finished, you can start using your computer by repeating the first-start process. Refresh your PC from the recovery backup 1.
  • Page 79: Frequently Asked Questions

    REQUENTLY ASKED QUESTIONS The following is a list of possible situations that may arise during the use of your computer. Easy solutions are provided for each one. I turned on the power, but the computer does not start or boot up Look at the power indicator: •...
  • Page 80 If pressing a key does not turn the display back on, three things might be the cause: • The brightness level might be too low. Press (increase) to adjust the brightness level. • The display device might be set to an external monitor. Press toggle the display back to the computer.
  • Page 81 The keyboard does not respond Try attaching an external keyboard to a USB port on the computer. If it works, contact your dealer or an authorized service center as the internal keyboard cable may be loose. The printer does not work Check the following: •...
  • Page 82: Tips And Hints For Using Windows 8

    IPS AND HINTS FOR USING INDOWS We know this is a new operating system that will take some getting used to, so we've created a few pointers to help you get started. Three concepts you might want to keep in mind 1.
  • Page 83: How Do I Jump Between Apps

    How do I turn off my computer? Press the Windows key + <C>, click Settings > Power and select the action you'd like to take. Alternatively, from Desktop, click Packard Bell Power Button and select the action you'd like to take.
  • Page 84: How Do I Unlock My Computer

    How do I unlock my computer? Press the any key and click on a user account icon to unlock the computer. If your account has a password set, you will need to enter the password to continue. How do I personalize my computer? You can personalize Start with a different background image or by arranging the tiles to suit your personal needs.
  • Page 85: I Want To Use Windows In The Way That I'm Used To - Give Me My Desktop Back

    To change the background, press the Windows key + <C> and click Settings > Change PC settings > Personalize. Click Lock screen at the top of the page and select the image and apps you would like to see on the lock screen.
  • Page 86 To view the complete list of apps, press the space bar or the Menu key and click All apps. How do I make an app appear on Start? If you're in All apps and you want to make an app appear on Start, you can select the app and right-click on it.
  • Page 87: What Is A Microsoft Id (Account)

    What is a Microsoft ID (account)? A Microsoft account is an email address and password that you use to sign in to Windows. You can use any email address, but it is best if you choose the one you already use to communicate with friends and sign in to your favorite websites.
  • Page 88: How Do I Check For Windows Updates

    How do I check for Windows updates? Press the Windows key + <C> and click Settings > Change PC settings > Windows Updates. Click Check for updates now. Where can I get more information? For more information please visit: • Windows 8 tutorials: www.packardbell.com/windows8-tutorial •...
  • Page 89: Regulatory Information

    EGULATORY INFORMATION REVENTION OF HEARING LOSS - Caution: Permanent hearing loss may occur if earphones or headphones are used at high volume for prolonged periods of time. - A pleine puissance, l’écoute prolongée du baladeur peut endommager l’oreille de l’utilisateur. CAUTION when listening: To protect your hearing, follow these instructions.
  • Page 90 - The following safety precautions should be observed: Do not touch or move antenna while the unit is transmitting or receiving. - Do not hold any component containing the radio such that the antenna is very close or touching any exposed parts of the body, especially the face or eyes, while transmitting.
  • Page 91 separation distance of at least 20 cm (8 inches) from all persons or at the minimum distance as specified by the module grant conditions. FCC grants can be viewed from the FCC Equipment Authorization website at https://fjallfoss.fcc.gov/oetcf/eas/ reports/GenericSearch.cfm by entering the FCC ID printed on the module label. - Warning: The wireless adapter is not designed for use with high-gain directional antennas.
  • Page 92 - IEEE Std. 802.11n draft 2.0 compliant on Wireless LAN - Wireless Fidelity certification, as defined by the Wi-Fi Alliance The Wireless Adapter and Your Health The wireless adapter, like other radio devices, emits radio frequency electromagnetic energy. The level of energy emitted by the wireless adapter, however, is less than the electromagnetic energy emitted by other wireless devices such as mobile phones.
  • Page 93 controls are provided for this wireless adapter allowing any change in the frequency of operations outside the FCC grant of authorization for U.S operation according to Part 15.407 of the FCC rules. USA — Federal Communications Commission (FCC) This device complies with Part 15 of the FCC Rules. Operation of the device is subject to the following two conditions: - This device may not cause harmful interference.
  • Page 94 - Increase the distance between the wireless adapter and the equipment experiencing the interference. - Connect the computer with the wireless adapter to an outlet on a circuit different from that to which the equipment experiencing the interference is connected. - Consult the dealer or an experienced radio/TV technician for help.
  • Page 95 fréquences dans les bandes 5,25 - 5,35 GHz et 5 65 - 5 85 GHz. Ces stations radar peuvent créer des interférences avec ce produit et/ou lui être nuisible. Le gain d’antenne maximum permissible pour une utilisation avec ce produit est de 6 dBi afin d’être conforme aux limites de puissance isotropique rayonnée équivalente (P.I.R.E.) applicable dans les bandes 5,25 - 5,35 GHz et 5,725 - 5,85 GHz en fonctionement point-à-point.
  • Page 96 List of National Codes This equipment may be operated in the following countries:i 3166 2 3166 2 3166 2 3166 2 Country Country Country Country letter letter letter letter code code code code United Austria Germany Malta Kingdom Netherlan Belgium Greece Iceland Liechtenstei...
  • Page 97 "Specific Absorption Rate" (SAR), and the SAR limit is 2.0 W/ kg averaged over 10 gram of body tissue. It meets the requirements of the International Commission on Non-Ionizing Radiation Protection (ICNIRP). For body worn operation, this device has been tested and meets the ICNIRP exposure guidelines and the European Standard, for use with dedicated accessories.
  • Page 98 Par la présente Acer Inc. déclare que l'appareil notebook PC est conforme aux exigences essentielles et aux autres dispositions pertinentes de la directive 1999/5/CE French Par la présente, Acer Inc. déclare que ce notebook PC est conforme aux exigences essentielles et aux autres dispositions de la directive 1999/5/CE qui lui sont applicables Härmed intygar Acer Inc.
  • Page 99 Con la presente Acer Inc. dichiara che questo notebook PC è Italian conforme ai requisiti essenziali ed alle altre disposizioni pertinenti stabilite dalla direttiva 1999/5/CE. Por medio de la presente Acer Inc. declara que el notebook PC Spanish cumple con los requisitos esenciales y cualesquiera otras disposiciones aplicables o exigibles de la Directiva 1999/5/CE Acer Inc.
  • Page 100 Italy The use of these equipments is regulated by: 1.D.L.gs 1.8.2003, n. 259, article 104 (activity subject to general authorization) for outdoor use and article 105 (free use) for indoor use, in both cases for private use. 2.D.M. 28.5.03, for supply to public of RLAN access to networks and telecom services. L’uso degli apparati è...
  • Page 101 低功率射頻電機須忍受合法通信或工業、科學及醫療用電波輻射性電機設備之干擾。 ODIFICATIONS TO THE RODUCT CE Marking Packard Bell cannot be held responsible for unauthorized modifications made by the user and the consequences thereof, which may alter the conformity of the product with the CE Marking. Regulatory information - 101...
  • Page 102 Radio frequency interference The manufacturer is not responsible for any radio or TV interference caused by unauthorised modifications to this equipment. ONNECTIONS AND REMOTE EARTHS PELV (Protected Extra Low Voltage) To ensure the extra-low voltage integrity of the equipment, only connect equipment with mains-protected electrically-compatible circuits to the external ports.
  • Page 103 Only Ethernet LAN or RTC modem cable can have length exceeding 3 metres. Packard Bell recommends that you add a ferrite core round clip to each cable connecting your computer to a hardware device that was not included with your computer.
  • Page 104 During product certification, Packard Bell used the following cable quality: - USB2.0 Certified Cables from Hama 46778 - IEEE1394 shielded FireWire from Hama 50011 - RCA-RCA shielded Audio/Video Cables from Thomson KHC001M, KHC012M, KHC028M - Stereo Jack shielded Audio cables from Hama 43330H, 42714H Heat Build-up and Portable Computers The AC adapter and the underside of the computer can become hot after prolonged use.
  • Page 105 ACKAGING The packaging of this product is compliant with the European Environmental Directive 94/ 62/EC from December 20th 1994 and its equivalent in the French Legislation by the Decree 98-638 from july 20th 1998. OMPLIANT WITH USSIAN REGULATORY CERTIFICATION Regulatory information - 105...
  • Page 106: Environment

    UR COMMITMENT TO ENVIRONMENTAL PROTECTION Environment has been at the heart of our products. Packard Bell is committed to limit the environmental impact of its products during product life cycle. Starting at design phase, with a very strict procurement policy, maximum attention is given to electronic components in order to limit their weight in heavy metals such as lead, cadmium, chromium, mercury, etc.
  • Page 107 Products that are ENERGY STAR qualified use less energy and prevent greenhouse gas emissions by meeting strict energy efficiency guidelines set by the U.S. Environmental Protection Agency. Packard Bell is committed to offering products and services worldwide that help customers save money, conserve energy and improve the quality of our environment.
  • Page 108 - Note: Information in this section may not apply to your computer. Packard Bell ENERGY STAR qualified products: - produce less heat and reduce cooling loads in warmer climates. - automatically go into "display Sleep" and "computer Sleep" mode after 10 and 30 minutes of inactivity, respectively.
  • Page 109: Software License

    OFTWARE LICENSE - Note: Most of the software applications are already preinstalled on your Packard Bell computer. They are ready to use or to set up. However, some titles require a CD or DVD to run. You will find these discs in your computer's packaging.
  • Page 110 2. Copyright The SOFTWARE is owned by Packard Bell or its suppliers and is protected by United States copyright laws and international treaty provision. Therefore, you must treat the SOFTWARE like any other copyrighted material (e.g. a book or musical recording) except that you may transfer the CD and/or DVD disc portion of the SOFTWARE, if any, to a single hard disk provided you keep the original solely for backup or archival purposes.
  • Page 111 GPL or write to the free Software Foundation, Inc. and request a copy. The address of the Free Software Foundation, Inc is: 59 Temple Place - Suite 330, Boston, MA, 02111-1307, USA. For a period of three (3) years as commencing from your receipt of this software, you may obtain a complete machine-readable copy of the source code for the Free Software under the terms of the GPL without charge except for the cost of media, shipping, and handling, upon a written request to us.
  • Page 112: 112 - Index

    ....... 35 ........28 checking level network ....... 10 ..........20 Cleaning your computer Cursor ....49 Display Packard Bell Website ......... 17 hotkeys Drives ...... 26 display Memory card reader ......79 ............ 44 troubleshooting Documentation 112 - Index...
  • Page 113 Memory card reader .... 42, 59 ..........44 Recovery Management Modem ..........51 Malware ..........28 ....49, 53 network Norton Internet Security ......45 Network connections ........49 Packard Bell Website ....42 ..........20 Recovery Management Pointer Index - 113...
  • Page 114 Antivirus troubleshooting ........57 ..........50 Updates Spyware Software Support ......109 ....49 Software License Packard Bell Website ......27 Uninstalling hardware Update ......28 ..57 universal serial bus Windows automatic updates ..........22 view left ..........22 ..........

Table of Contents