Ug Gateway 1.0 en Sje06 PT
Ug Gateway 1.0 en Sje06 PT
Ug Gateway 1.0 en Sje06 PT
Gateway LT Series
- 1
TABLE
Starting your computer
OF CONTENTS
4
34 35
Optimizing battery life........................... Battery-low warning............................... 4 5 Software 6 Using Windows and your software............... 6 Welcome Center ..................................... 6 Internet security offer ............................ Productivity software ............................. Computer Basics 8 Gateway Recovery Management........... Safety and comfort ........................................... 8 Playing multimedia files ......................... Safety precautions ..................................... 8 Playing DVD movies................................ Health precautions .................................. 11 Social networks (optional) ..................... Wireless connection.......................................... Registration....................................................... Software installation ........................................ Recovery ............................................................ Having trouble? ................................................
37
37 37 37 38 38 38 42 44
49 Top view - display ........................................... 15 Internet Social Networks (optional) ..................... 49 Top view - keyboard ....................................... 16 Special keys .............................................. 17 First steps on the net...................................... 50 Protecting your computer ...................... 50 Rear view......................................................... 20 Choose an Internet Service Provider...... 50 Left view.......................................................... 20 Network connections.............................. 52 Right view ....................................................... 21 Surf the Net! ........................................... 55 Base view......................................................... 23 Security .................................................... 58 Upgrading your computer
Expanding through options ........................... 25 Helpdesk Connectivity options................................ 25 Safe computing .............................................. Maintenance ........................................... Power supply 30 Updates ................................................... AC power adapter .......................................... 30 Windows Remote Assistance.................. Battery pack .................................................... 31 Recovery Battery pack characteristics..................... 31 Gateway Recovery Management .................. Installing or removing the battery Creating recovery discs ........................... pack .......................................................... 33 Charging the battery............................... 34 Recovering your system ................................. Types of recovery .................................... Checking the battery level ...................... 34
14
25
72
72 72 79 81
82
82 82 86 87
Visit registration.gateway.com and discover the benefits of being a customer of Gateway. Remark: All images are for reference purposes only. Actual configuration may vary.
Table of contents - 3
S T A R T I N G YOUR C OMPUTER
Thank you for purchasing this Gateway computer! This guide has been designed to introduce you to the features of your computer and assist in your computing experience. After setting up and starting your computer, as shown in the setup instructions, it will ask you questions that will help you connect to the Internet. Your computer will then configure installed software.
WIRELESS CONNECTION
To connect to a wireless network, first check the wireless features of your computer are on, and that the router or modem you want to connect to is also correctly configured. If wireless is not on, press the communication key ( Launch Manager and make sure Wi-Fi is On. ) to open the
Your computer will detect and display any available networks, select your network and enter the password, if required. After a short delay, your computer should connect to the Internet. If your network is not detected, or your computer does not connect to the Internet, please refer to your ISP or routers documentation. After your computer starts and you can use it, open Internet Explorer and follow the instructions.
Alternatively, use a network cable to connect directly to a network port on your router. Please refer to your ISP or routers guide.
REGISTRATION
When using your computer for the first time, it is recommended that you register it. This gives you access to some useful benefits, such as: Faster service from our trained representatives. Membership in the Gateway community: receive promotions and participate in customer surveys. The latest news from Gateway.
How to register
During the initial startup of your computer, a window will invite you to register. Please fill in the information and click Next. The second window you'll see contains optional fields that will help us to provide you with a more personable customer service experience.
Another option
Another way to register your Gateway product is to visit our website at registration.gateway.com. Choose your country and follow the simple instructions. After registering, you will be sent a confirmation email with important information that you should keep in a safe place.
SOFTWARE INSTALLATION
Your computer will automatically install software and prepare your computer for use. This may take some time, please do not turn off your computer; wait until the installation has finished.
RECOVERY
You should create recovery discs as soon as you are able. The Gateway Recovery Management program allow you to create recovery discs and then to restore or reinstall applications and drivers provided by Gateway. You will need a pack of writable DVDs. See page 82 for more information about recovery.
HAVING TROUBLE?
Gateway provides several options to support your purchase.
Gateway support
Make sure you write down your computer serial number, date and place of purchase and model name on the area provided in this guide; save your proof of purchase. Before you call us, please write down any error message that accompanies the problem, and have the computer in front of you and switched on if possible. Having these items to hand when contacting us will ensure better and quicker service.
Gateway website
Remember to visit www.gateway.com - Check out the support section for up-to-date information, help, drivers and downloads.
C OM P U T E R B A S I C S
SAFETY AND COMFORT
Safety precautions
Please follow the guidelines below to use your computer comfortably and to avoid health problems.
Computer environment
Make sure that the computer: Is used on a stable surface, stand or table. A fall can seriously damage the computer. Is not used on a surface that vibrates, or used when taking part in sport, exercise or other activities in a dynamic environment. Vibration or movement can loosen fastenings, damage internal components and even cause battery leakage. Is away from direct sunlight and sources of heat. Is away from magnetic fields or any device generating static electricity. Is kept at least 30 centimetres (one foot) away from a mobile phone. Is not in a dusty or damp environment. Is not used near water. Never spill liquids of any kind on or into your computer.
8
Is not placed on a carpet or any other surface that may have an electrical charge.
Cables
Make sure that: Cables are not strained and that there is no risk of people walking or tripping over them. Other devices do not crush the cables. The power cable is connected to the computer before connecting the power cable to the AC power outlet. The power cable is unplugged from the power outlet before disconnecting the power cable from the computer. Three-pin power cords are connected to a grounded power outlet. The power outlet is easily accessible and as close to the computer as possible (do not overload it with too many adapters). If your computer uses an external AC adapter: Do not cover or place objects on the AC adapter. Allow the adapter to cool properly during use by keeping it clear of objects. Only use the AC adapter that is supplied with your computer. Although other adapters may look similar, using them can damage your computer. If a replacement is required, use only parts certified for use with your computer.
Computer Basics - 9
Note: If your computer includes slots for memory cards or expansion devices, plastic dummies may be installed in the card slots. Dummies protect unused slots from dust, metal objects or other particles. Save the dummies for use when no cards are in the slots. Servicing your computer
Do not attempt to service your computer yourself, as opening or removing covers may expose you to dangerous voltage or other risks. Refer all servicing to qualified service personnel. Unplug your computer from the wall outlet and refer servicing to qualified service personnel when: the power cord or plug is damaged, cut or frayed, liquid was spilled into the product, the product was exposed to rain or water,
10
the product has been dropped or the case has been damaged the product exhibits a distinct change in performance, indicating a need for service the product does not operate normally after following the operating instructions
Note: Adjust only those controls that are covered by the operating instructions, since improper adjustment of other controls may result in damage and will often require extensive work by a qualified technician to restore the product to normal condition.
Health precautions
The computer and accessories may contain small parts. Keep them out of the reach of small children. If you work or play for hours at a time, then make sure you take regular breaks. Look away from the computer's screen once in a while. Do not use your computer if you are tired. Arrange your computer so that you can work in a natural and relaxed position. Place items that you use frequently within easy reach. Position your computer directly in front of you for increased safety and comfort. Ensure that your keyboard and touchpad are at a comfortable height. The screen should be about 45-70 cm (18-30 inches) from your eyes. If you use your computer for long periods while sitting at a desk, invest in an external keyboard for improved comfort.
Computer Basics - 11
To protect your hearing, when using speakers or headphones, increase volume gradually until you can hear clearly and comfortably; do not increase the volume level after your ears have adjusted. Do not listen to high volumes for extended periods. Do not increase the volume to block out noisy surroundings; decrease the volume if you cannot hear people speaking near you. The computers underside, power adapter and the air from ventilation slots may become hot during use. Avoid continuous body contact and do not place the computer on your lap while it is operating. Ensure that the computers ventilation slots and openings are never obstructed or covered. Do not place the computer on a soft surface (such as a carpet, chair or bed) that may block ventilation slots. Do not push objects of any kind into ventilation or case slots as they may touch dangerous voltage points or short-out parts that may result in a fire or electric shock. Some disorders of the hands, wrists, arms, neck, shoulders, legs and back may be associated with, or aggravated by certain repetitive actions. To reduce your risk of developing these disorders, type with your wrists straight and your hands and wrists floating above the keyboard. If you experience periods of pain, tingling, numbness or other discomfort, please contact your doctor. We advise that parents monitor the use of games by their children. If you or your child experience any of the following symptoms: dizziness, blurred vision, eye or muscle twitches, loss of
12
consciousness, disorientation, any involuntary movement or convulsion, IMMEDIATELY discontinue use and consult your doctor. This may happen even if the person has no medical history of epilepsy.
Computer Basics - 13
G E T T I N G TO K N O W Y O U R C O M P U T E R
After setting up your computer as illustrated in the setup instructions, let us show you around your new Gateway computer.
14
2 3
#
1 2 3
Icon
Item
Webcam Display screen Microphone
Description
Web camera for video communication. Also called Liquid-Crystal Display (LCD), displays computer output. Internal microphone for sound recording.
3 4
#
1 2 3
5
Description
Turns the computer on and off. Indicates the computer's power status. For entering data into your computer.
Icon
Item
Power button / indicator Keyboard Touchpad
16
Icon
Item
Power indicator
Description
Indicates the computer's power status. Indicates the computer's battery status.
Battery indicator
Charging: The light shows amber when the battery is charging. Fully charged: The light shows blue when in AC mode.
Indicates the computers wireless connectivity device status. The left and right side of the button function as left and right selection buttons.
Note: The front panel indicators are visible even when the computer cover is closed.
Special keys
Your computers keyboard includes keys that activate special functions. The function of each key is clearly marked with an icon.
Icon Function
Fn Hotkey for second function
Description
Activates a second function on certain keys.
Social Networking
If this application is not installed, the key will start your instant messenging application.
Icon Function
Help Communication Display toggle Screen blank Touchpad toggle Speaker toggle Volume down Volume up Brightness down Brightness up
Description
Opens the User's Guide for your computer. Enables/disables the computers communication devices. Switches display output between the display screen, external monitor (if connected) and both. Turns the display screen backlight off to save power. Press any key to return. Turns the internal touchpad on and off. Turns the speakers on and off. Decreases the sound volume. Increases the sound volume. Decreases the screen brightness. Increases the screen brightness.
18
Hotkeys
The computer uses hotkeys (key combinations) to access Num Lock, function keys and navigation commands. To activate hotkeys, press and hold the Fn key (bottom left) before pressing the other key in the hotkey combination.
Hotkey
Fn + Special keys
Function
Function keys Home End
Description
Activates the F1 to F12 keys. Scrolls to the beginning of a document. Scrolls to the end of a document.
Note: It is not necessary to press the Fn key to use the F1 to F12 function keys when starting your computer or when using the BIOS. To swap the hotkey and special function of the F1 to F12 keys, change the function key setting in the BIOS (to open the BIOS press F2 when starting your computer, then select the Main menu and change Function key behavior to Function keys).
REAR VIEW
1
#
1
Icon
Item
Battery bay
Description
Houses the computer's battery pack.
LEFT VIEW
1
#
1 2 3
Icon
Item
DC-in jack Ethernet (RJ-45) port External display (VGA) port
Description
Connects to your computers AC adapter. Connects to an Ethernet 10/100/1000-based network. Connects to a display device (e.g., external monitor, LCD projector).
20
#
4 5
Icon
Item
Ventilation and cooling fan USB 2.0 port
Description
Allows the computer to stay cool.
RIGHT VIEW
1
# Icon Item
Multi-in-1 card reader
3
Description
Accepts Secure Digital (SD), MultiMediaCard (MMC), Memory Stick PRO (MS PRO), xDPicture Card (xD).
Push to remove/install the card. Only one card can operate at any given time.
Icon
Item
Microphone jack
Description
Accepts inputs from external microphones. Connects to audio line-out devices (e.g., speakers, headphones).
Supports compatible 3.5 mm headsets with built-in microphone (e.g. Acer smart handheld headsets).
Connect to USB devices (e.g., USB mouse, USB camera). Connects to a Kensington-compatible computer security lock.
Wrap the computer security lock cable around an immovable object such as a table or handle of a locked drawer. Insert the lock into the notch and turn the key to secure the lock. Some keyless models are also available.
22
BASE VIEW
6
1 2
4
#
1
Icon
Item
Ventilation and cooling fan Memory compartment Hard disk bay
Description
Allows the computer to stay cool.
#
3 4 5 6
Icon
Item
Battery release latch Battery bay Battery lock Speakers
Description
Releases the battery for removal. Insert a suitable tool and slide to release. Houses the computer's battery pack. Locks the battery in position. Deliver stereo audio output.
24
U P G R A D I N G YOUR COMPUTER
EXPANDING THROUGH OPTIONS
Your computer offers you many options for a complete computing experience.
Connectivity options
Ports allow you to connect peripheral devices to your computer. For instructions on how to connect different external devices to the computer, read the following section.
If the card contains some files, the Windows Auto Play window may appear (this depends on the contents of the card) and ask you if you wish to use a program to access the contents of the card. Select an option here if it is appropriate, otherwise select Cancel. If the card contains no files, or unknown files, a window will open showing the contents of the card.
Built-in networking
The built-in networking allows you to connect your computer to an Ethernet-based network. Connect an Ethernet cable from the Ethernet (RJ-45) port on the chassis of the computer to a network jack or hub on your network.
26
Certain computers may include one or more USB 3.0 ports. These resemble standard USB ports, except they include additional internal connections and are blue. You may use USB 3.0 compatible devices with these ports to benefit from faster transfer speeds.
Video port
Connect to a monitor with a VGA or DVI port (the type of connection supported depends on your computers configuration). The appropriate cable is usually included with the monitor.
Follow these steps to connect an monitor to your computer: 1. Check that the computer is powered off and the monitor power switch is turned off. 2. Attach the video cable to the monitor port on the computer. Secure the cable connection with the screws provided. 3. Connect the monitor power cable and plug it into a properly grounded wall outlet. 4. Follow any setup instructions in the monitor's user's guide. 5. Turn on power to the monitor, then the computer. 6. Make sure that the current resolution and refresh rate do not exceed the specifications of the monitor. If necessary change the display settings used by the computer.
Note: To access the display controls: Click on Start, Control Panel, Appearance and Personalization. Click on the Display category, then select Change Display Settings.
28
P OWER S U P P L Y
AC POWER ADAPTER
Your computer can use the supplied external power adapter (a power 'brick') to run on AC power. A power cable is provided that is appropriate for the country where the computer was purchased. The power adapter provides adequate power to run your computer and recharge the battery pack at the same time.
Caution: Do not cover or place objects on the AC adapter. Keeping the adapter clear of objects allows the adapter to cool properly during use. Only use the AC adapter that is supplied with your computer. Although other adapters may look similar, using them can damage your computer.
30
Warning: The AC adapter and the underside of the computer can become hot after prolonged use. This is normal, but may cause injury with prolonged contact.
BATTERY PACK
The computer uses a battery pack that gives you extended use between charges.
Power supply - 31
32
Warning: Do not expose battery packs to temperatures below 0 C (32 F) or above 45 C (113 F). Extreme temperatures may adversely affect the battery pack. By following the battery conditioning process you condition your battery to accept the maximum possible charge. Failure to follow this procedure will prevent you from obtaining the maximum battery charge, and will also shorten the effective lifespan of the battery. In addition, the useful lifespan of the battery is adversely affected by the following usage patterns: Using the computer on constant AC power with the battery inserted. If you want to use constant AC power, you are advised to remove the battery pack after it is fully charged. Not discharging and recharging the battery to its extremes, as described above. Frequent use; the more you use the battery, the faster it will reach the end of its effective life. A standard computer battery has a life span of about 300 charges.
Important! Before removing the battery from the unit, connect the AC adapter if you want to continue using your computer. Otherwise, turn off the computer first.
Power supply - 33
To install a battery pack: 1. Align the battery with the open battery bay; make sure that the end with the contacts will enter first, and that the top surface of the battery is facing up. 2. Slide the battery into the battery bay and gently push until the battery locks in place. To remove a battery pack: 1. Slide the battery release latch to release the battery. 2. Pull the battery from the battery bay.
Note: You are advised to charge the battery before retiring for the day. Charging the battery overnight before traveling enables you to start the next day with a fully-charged battery.
34
Battery-low warning
When using battery power pay attention to the Windows power meter.
Power supply - 35
Warning: Connect the AC adapter as soon as possible after the battery-low warning appears. Data will be lost if the battery to become fully depleted and the computer shuts down. When the battery-low warning appears, the recommended course of action depends on your situation: Situation Recommended Action The AC adapter and 1. Plug the AC adapter into the computer, and a power outlet are then connect to the mains power supply. available. 2. Save all necessary files. 3. Resume work. Turn off the computer if you want to recharge the battery rapidly. 1. Save all necessary files. 2. Close all applications. 3. Shut down the operating system to turn off the computer. 4. Replace the battery pack. 5. Turn on the computer and resume work. The AC adapter or a 1. Save all necessary files. power outlet is 2. Close all applications. unavailable. 3. Shut down the operating system to turn off You have no spare the computer. battery pack.
36
SOFTWARE
USING WINDOWS AND YOUR SOFTWARE
Gateway computers include software to help you use your computer; the programs and categories available on your computer depend on the model purchased. Most of this software is pre-installed and ready to be used; however some software may be provided on a CD or DVD and must first be installed if you wish to use it. To do so, insert the installation CD or DVD. An installation wizard will start automatically and all you have to do is follow the instructions on the screen.
Welcome Center
The first time you turn on your computer, the Welcome Center window opens. The Welcome Center introduces you to the new features and tools of Windows. You can access the Welcome Center later by clicking Start > Getting Started.
Software - 37
from the most recent online threats and protects your personal data (bank account credentials, credit card numbers, passwords, and more).
Productivity software
Work Great with Microsoft Office 2010 - Express your ideas, solve problems and simplify everyday projects with Office 2010. Photo editing - Easily edit and print your photos with Windows Live Photo Gallery. Then share them on Facebook, YouTube or Windows Live. Search & Decide with Bing - Find and organize the answers you need using Bing, so you can make faster, more informed decisions.
Windows Media Player Windows Media Player may be used to play MP3 or WMA audio files,
CDs or most video files.
Note: It is not recommended that you use Windows Media Player to play DVD movies. Other media players (such as Windows Media Center) provide additional playback options. Windows Media Center (optional)
Certain computers include allin-one media centers such as Windows Media Center. These programs can handle a variety of multimedia content, presented with simple menus that may be easily controlled with a remote control. You may watch live or recorded TV (if your computer has a TV tuner), listen to digital music, view pictures and personal videos, create CDs and DVDs, or access content from online services. To start the media program installed on your computer, click on Start > Windows Media Center.
Software - 39
Note: If you have an Internet connection, the Guide (Electronic Program Guide) allows you to view a list of current TV shows. This shows channel and network information, as well as the title, description and scheduled broadcast time of shows. Cyberlink PowerDVD (optional)
If your computer does not include Windows Media Center, or it is equipped with a Blu-ray drive, you may watch movies with PowerDVD. You may start PowerDVD by inserting a disc and waiting for the program to start automatically.
40
AutoPlay
The Windows AutoPlay function allows you to choose the way Windows handles media files on devices with removable storage (digital camera, CD, DVD, etc). If you have inserted a disk that contains files (such as a DVD, USB key or memory card), Windows will display a dialog box and ask you to choose how you want to open the files. For example, if you have inserted an audio CD or a DVD movie, Windows will automatically display a dialog box and ask you to choose how you want to play it. If Windows asks you to select a DVD player, we recommend that you always choose the DVD player included with your software collection (e.g. PowerDVD or Windows Media Player).
Software - 41
Codecs
A codec is software that is used to compress or decompress a digital media file, such as a song or video. Windows Media Player and other programs use codecs to play and create digital media files. For example, when you rip a song from an audio CD to your computer, the player uses the Windows Media Audio codec to compress the song into a compact WMA file. When you play that WMA file (or any WMA file that might be streamed from a Web site), the media player uses the Windows Media Audio codec to decompress the file so the music can be played through your speakers.
Important! When you launch the DVD player for the first time, the program asks you to enter the region code. DVD content is coded with one of six regions. Please refer to the table below for DVD
42
movie region code information. Once your DVD drive is set to a region code, it will play DVD discs of that region only. You can set the region code a maximum of five times (including the first time), after which the last region code set will remain permanent. Recovering your hard disk does not reset the number of times the region code has been set.
2. The DVD movie will automatically play after a few seconds. Region code 1 2 3 4 5 6 Country or region USA, Canada Europe, Middle East, South Africa, Japan Southeast Asia, Taiwan, South Korea Latin America, Australia, New Zealand Former USSR, parts of Africa, India People's Republic of China
Note: To change the region code, insert a DVD movie of a different region into the DVD drive. Please refer to the online help for more information.
Software - 43
Note: The Social Networks application is a pre-installed option and may not be installed on all computers.
Be aware of your friends' messages and posted images as they happen; a visible notification will alert you whenever a friend (or subscription) shows some activity. If your computer's keyboard features the optional Social Networks key (normally the top-right key), press it to display the Social Networks application.
automatically, click Log In, at the top of the Social Networks window. If you just want to create a new Facebook profile, click Sign Up and follow the instructions.
Note: All social activities require Internet access. Make sure you are connected to the Internet before using this application. Authorize access
To receive updates, you must authorize access to your social network accounts; each account must be activated separately. Click on the tab for the network you want to activate (Facebook, YouTube or Flickr). You need your account name and password for each network, or to create a new account if you do not have one.
Note: Note down all information you use for new accounts, including the account name, email address and password. Keep this information hidden in a safe place, so you may refer to it when you access your accounts in the future. Facebook
If you already have a Facebook account, click the Log In button to activate access, or Sign up to Facebook to create an account. If you choose Sign up to Facebook please fill in the requested information, with your email and an appropriate password. You will then continue to authorize access for your account. Please allow access for all steps, this will ensure all Social Networks features work normally.
Software - 45
YouTube
If you already have a YouTube account, enter the account information and click the Log In button to activate access, otherwise select Sign up to YouTube to create an account.
flickr
If you already have a flickr account, click the Log In button to activate access, otherwise select Sign up to flickr to create an account. Confirm that you authorise full access, this will ensure all Social Networks features work normally.
Quick actions
Click on a link to see more in a new window. I.e. click on a Facebook entry to open your Facebook account and view the entire entry; click on a YouTube video title to view the video. Enter your status in the What's on your mind? box and click Share. You friends on Fackbook will see your status instantly. To create a new album of photos in Facebook, select the images you want to add, drag them to your profile picture. You will be prompted for an album name and desciption. Click on Upload to start copying the images to your Facebook account.
46
Click the arrows in the bottom bar to see more pages, if there are more entries than can be shown on a page. Click on the question mark in the top bar Social Networks. to see the help file for
Click on the arrow in the top bar to hide the full application and display a small alert bar on the top of your screen. Click the alert bar (below) to see the full window with a summary of your friends' activities.
Note: Do not use the X icon to exit Social Networks, unless you want to stop sending or receiving updates. Use the arrow in the top bar to display the alert bar. Checking your news feeds and information
Select the tab for the network you want to view:
A series of buttons for the network are available for each network. Hover over the button to see a description. Select the button you want to see and scroll through the list of items. Example of Facebook tabs:
Software - 47
The first button, and the section viewed when a tab is first selected, are the News Feed (for Facebook), Most Viewed for YouTube and Contacts for Flickr. If there are more entries than can be shown on on page, use the arrows in the bottom bar to see more pages.
Changing settings
Click the settings icon to access settings for the social networks.
Live Update - If the Live Update button is active, you may download and install an updated version of the Social Networks application.
Click the tab for a network to see specific settings; you may set how often a network is checked (the refresh frequency) and logout from specifc networks in this section. Click the X to exit the Settings section.
48
INTERNET
Social Networks (optional)
The Social Networks application allows you to quickly view your friends' updates, and make your own updates without leaving the desktop. You can recieve notifications and status updates directly to your desktop, using the sidebar to monitor multiple social networks (e.g. Facebook, YouTube and Flickr).
Note: Applications vary depending on model. The Social Networks application is a pre-installed option and may not be installed on certain computers. Log in or Sign up
Click the icon of the social network that you want to use and click Login if you already have an account. If you do not have an account, click Sign Up and follow the instructions.
Note: All social activities require Internet access. Make sure you are connected to the Internet before using this application.
Internet - 49
Connection types
Depending on your computer model, your location and your communication needs, you have several ways to connect to the Internet.
50
Dial-up
Some computers include a telephone dial-up (modem) connector. This allows you to connect to the Internet using your telephone line. With a dial-up connection, you cannot use the modem and the telephone simultaneously on a single phone line. This type of connection is recommended only if you have limited use of the Internet as the connection speed is low and connection time is typically charged per hour.
Note: A DSL connection requires an appropriate modem. A modem is usually provided by the ISP when you register. Many of these modems include an router that provides network and wi-fi access.
Cable
A cable connection provides fast and always-on Internet service via a cable television line. This service is generally available in large cities.
Internet - 51
You can use your telephone and watch cable TV at the same time you are connected to the Internet.
Note: If your computer includes a SIM card slot, you require a compatible SIM card and a contract with a cellular provider. Before using the 3G features, check with your service provider to see if any additional charges will be incurred, especially roaming charges.
Network connections
A LAN (Local Area Network) is a group of computers (for example, within an office building or home) that share a common communications line and resources. When you set up a network, you can share files, peripheral devices (such as a printer) and an Internet connection. You can set up a LAN using wired technologies (such as Ethernet) or wireless technologies (such as WiFi or Bluetooth).
Wireless networks
A wireless LAN or WLAN is a wireless local area network, which may link two or more computers without using wires. Setting up a wireless
52
network is easy and allows you to share files, peripheral devices and an Internet connection.
Internet - 53
services. Read carefully the documentation supplied with your Access point/router for detailed setup instructions.
Wireless adapter
An internal wireless adapter is normally already installed in your computer. A button or controls in Windows allow you to activate or disactivate the adapter.
4 5 1 7 6 2 3
54
Internet - 55
4 3 2 1
10
1. Quick tabs: Select and navigate through open tabs by displaying thumbnails of them all in a single window. 2. Favorites Center: Manage your favorite websites, your browsing history and your RSS Feed subscriptions in just a few clicks. 3. Bing Bar: Search the web and use Bing tools to alert you of news, fill forms automatically, stay safe online and more. 4. Back and Forward buttons: Navigate through pages you have already visited.
56
5. Address bar: Type in an Internet address (e.g. www.gateway.com) and press the Enter key on your keyboard, this will take you directly to the address you typed. 6. Tabs: View multiple sites in a single browser window by switching from one site to another through tabs at the top of the browser frame. 7. RSS feeds: Allow you to keep up with your favorite websites in an automated manner. An icon on the toolbar indicates that the site offers a subscription feed that will notify you when content is updated. Your browser delivers the information to your Favorites Center. Now you can read news headlines, sports scores, etc. as soon as they arrive. 8. Reduce, maximize or close the window. 9. Instant Search Box: Search the web without having to open a search provider page. You can customize your search by setting your favorite search provider as the default. Use the dropdown list to choose a provider. 10.Link to the Help menu: click to access the Internet Explorer Help section. There you can find information about Internet Explorer and take the Internet Explorer Tour. You may also press F1 on your keyboard.
Caution: Internet Explorer includes a Phishing Filter that warns you about and helps to protect you from potential or known fraudulent websites (sites that look legitimate but actually are designed to capture your personal information). The address bar
Internet - 57
will turn yellow and a warning message will be displayed if you visit a suspected phishing site.
Gateway website
To get you started why not visit our website, www.gateway.com. Gateway is dedicated to provide you with on-going personalized support. Check out our Support section to get help tailored to your needs. www.gateway.com is your portal to a world of online activities and services: visit us regularly for the latest information and downloads!
Security
You are probably eager to explore everything the Internet has to offer. In order for you to be safe online, Gateway has pre-installed Symantecs award-winning Norton Internet Security on your computer. Norton Internet Security runs quietly in the background to block todays complex threats and protect your identity when you shop, bank, or browse online. Norton Internet Security blocks online identity theft, detects and eliminates spyware, removes viruses and Internet worms, protects against hackers.
58
Note: Gateway guarantees that your computer was 100% virus free at the time of purchase and does not cover damages due to viruses. What is spyware?
Spyware refers to generally unwanted programs that are downloaded onto your computer while connected to the Internet, often without you knowing it. Once it has infected your computer, it can snoop on your browsing activity, collect personal information, cause pop-up ads to appear, or even change the configuration of your computer. Spyware consumes resources on your computer; it can slow down your Internet connection or entire computer system, and even cause crashes. Spyware is sometimes used by unscrupulous companies to monitor and track the sites you visit on the Internet so as to determine your web-surfing habits and display targeted pop-up ads on your screen. However, some kinds of spyware go beyond simple tracking and
Internet - 59
actually monitor keystrokes and capture passwords, posing a serious security risk.
What is malware?
Malicious software, also known as malware, is software designed to deliberately harm your computer. For example, viruses, worms, and Trojan horses are malicious software. To help protect your computer against malware, make sure it is using up-to-date antivirus and antimalware software.
as quickly and easily as possible. The more difficult you make their job, the more likely they are to leave you alone and move on to an easier target. The tips below provide basic information on how you can prevent online fraud.
Keep your computer current with the latest patches and updates
One of the best ways to keep attackers away from your computer is to apply patches and other software fixes when they become available. By regularly updating your computer, you block attackers from being able to take advantage of software flaws (vulnerabilities) that they could otherwise use to break into your system. While keeping your computer up-to-date will not protect you from all attacks, it makes it much more difficult for hackers to gain access to your system, blocks many basic and automated attacks completely, and might be enough to discourage less-determined attackers, so they will give up and look for a more vulnerable computer elsewhere. More recent versions of Microsoft Windows and other popular software can be configured to download and apply updates automatically so that you do not have to remember to check for the latest software. Taking advantage of auto-update features in your software is a great start toward keeping yourself safe online.
Internet - 61
You could think of a firewall as a sort of "policeman" that watches all the data attempting to flow in and out of your computer on the Internet, allowing communications that it knows are safe and blocking "bad" traffic such as attacks from ever reaching your computer. The next line of defense many times is your antivirus software, which monitors all online activities such as email messages and Web browsing and protects an individual from viruses, worms, Trojan horse and other types of malicious programs. Your antivirus and antispyware software should be configured to update itself, and it should do so every time you connect to the Internet. Integrated security suites such as Norton Internet Security, which combine firewall, antivirus, antispyware with other features such as antispam and parental controls, have become popular as they offer all the security software needed for online protection in a single package. Many people find using a comprehensive security suite an attractive alternative to installing, configuring and updating several different types of security software. A complete version of Norton Internet Security is pre-installed on your Gateway system. It includes a free trial subscription to protection updates. Make sure you Activate it!
accumulated. The following tips can help make your online experiences secure: Selecting a password that cannot be easily guessed is the first step toward keeping passwords secure and out of the wrong hands. Strong passwords have eight characters or more and use a combination of letters, numbers and symbols (e.g., # $ % ! ?). Avoid using any of the following as your password: your login name, anything based on your personal information such as your last name, and words that can be found in the dictionary, especially "password". Try to select especially strong, unique passwords for protecting activities like online banking. Keep your passwords in a safe place and try not to use the same password for every service you use online. Change passwords on a regular basis, at least every 90 days. This can limit the damage caused by someone who has already gained access to your account. If you notice something suspicious with one of your online accounts, one of the first steps you can take is to change your password.
Internet - 63
rarely possible, the following list contains some advice for how to share personal information safely online: Keep an eye out for phony email messages. Things that indicate a message may be fraudulent are misspellings, poor grammar, odd phrasings, Web site addresses with strange extensions, Web site addresses that are entirely numbers where there are normally words, and anything else out of the ordinary. Additionally, phishing messages will often tell you that you have to act quickly to keep your account open, update your security, or urge you to provide information immediately or else something bad will happen. Don't take the bait. Don't respond to email messages that ask for personal information. Legitimate companies will not use email messages to ask for your personal information. When in doubt, contact the company by phone or by typing in the company Web address into your Web browser. Don't click on the links in these messages as they make take you to fraudulent, malicious Web sites. Steer clear of fraudulent Web sites used to steal personal information. When visiting a Web site, type the address (URL) directly into the Web browser rather than following a link within an email or instant message. Fraudsters often forge these links to make them look convincing. A shopping, banking or any other Web site where sensitive information should have an "S" after the letters "http" (i.e. https:// www.yourbank.com not http://www.yourbank.com). The "s" stands for secure and should appear when you are in an area requesting
64
you to login or provide other sensitive data. Another sign that you have a secure connection is the small lock icon in the bottom of your web browser (usually the right-hand corner). Pay attention to privacy policies on Web sites and in software. It is important to understand how an organization might collect and use your personal information before you share it with them. Guard your email address. Spammers and "phishers" sometimes send millions of messages to email addresses that may or may not exist in hopes of finding a potential victim. Responding to these messages or even downloading images ensures you will be added to their lists for more of the same messages in the future. Also be careful when posting your email address online in newsgroups, blogs or online communities.
Internet - 65
hard to believe, ask for someone else's opinion, read the fine print, or even better, simply ignore it.
To open the Action Center, click on Start and Security > Action Center. Alternatively, if a security alert has been reported (in the Notification Area, next to the clock) then you can click on the notification balloon or doubleclick on the small Security Alert icon.
The Action Center indicates the status and settings used for important applications that protect your computer. In addition Windows Firewall, Windows Defender and Windows Automatic Updates are provided by Microsoft as part of a comprenhesive system to defend your computer. The antivirus application varies according to the program installed on your computer.
Windows Firewall
Windows has a firewall that protects your computer when connected to the Internet. It stops programs from accessing the Internet without your permission.
Internet - 67
Certain programs need access to the Internet to function properly, or even to function at all. If this is the case, you will usually be asked to allow access when you install a program, or the first time you use it. To check firewall settings, click on Start > Control Panel > System and Security > Windows Firewall.
Note: When you first start to use a Firewall it is in a Learning mode, you may see pop-up windows alerting you that certain programs you know and trust wish to access the internet. After a period of time the Firewall will know your list of trusted programs and wont ask for permission the next time the program tries to connect to the internet. The Firewall also protects your computer from programs from the internet trying to access your computer; this sometimes is necessary to allow access for program updates, downloads, etc. Caution: Please note that most security software suites provide
similar functionality and will disable Windows Firewall in order to improve system performance.
68
Windows Updates
If you have an active Internet connection, Windows can check for important updates for your computer and install them automatically. These updates include security patches and program updates that can improve your computing experience and help protect your computer against new viruses and attacks.
helps protect your computer against malicious and unwanted software, such as spyware and adware. Windows Defender is installed and turned on by default.
To help protect your privacy and your computer, Windows Defender includes real-time protection options. Real-time protection alerts you when spyware and other potentially unwanted software attempt to install themselves or run on your computer. You are also alerted if programs attempt to change important Windows settings.
Note: Windows Defender works with your Windows Update settings to automatically install the latest definitions.
Internet - 69
Caution: Please note that most security software suites provide similar functionality and will disable Windows Defender in order to improve system performance. User Account Control
The User Accounts control panel can help prevent unauthorized changes to your computer. User Accounts will ask you for permission or an administrator password before performing actions that could potentially affect your computer's operation or that change settings that affect other users. When you see a User Account message, read it carefully, and then make sure the name of the action or program that's about to start is one that you intended to start.
By verifying these actions before they start, User Account settings can help prevent malicious software (malware) and spyware from installing or making changes to your computer without permission.
70
To access User Account settings, click on Start User Accounts and Family Safety > User Accounts.
Note: You may turn off the User Account Control Messages (not recommended) in the User Account Control settings window. Internet Explorer security settings
Internet sites use small files called cookies to keep track of user preferences and information. You can adjust your Internet browser's security settings to determine how much -or how little- information you are willing to accept from a Web site. To access Internet Explorer security settings: 1. In Internet Explorer, click on Tools > Internet Options. 2. In the Privacy tab, move the slider up or down to select a setting.
Internet - 71
HELPDESK
SAFE COMPUTING
To make the most of your new computer and ensure it runs smoothly for a long time, you should use the programs below and regularly perform the actions described in this guide.
Maintenance
Error checking
Using the Check Disk tool regularly prevents your system from getting unreliable and information getting lost. It checks and repairs two types of errors: file system errors, such as fragmented files that were not deleted and files with invalid sizes or dates; physical errors, which may occur on your hard disk as it wears out over time. 1. Click on Start > Computer. Right-click on the Gateway (C:) icon and select Properties. 2. Click on Tools and Check Now in the Error-checking section.
72
3. Tick Automatically fix file system errors in the options area. If you tick Scan for and attempt recovery of bad sectors, your computer will carry out the physical error checking when you next restart your computer. Click on Start to proceed.
Disk Cleanup
The Disk Cleanup Wizard helps free up space on your disk drive. It searches your drive and displays unused files, such as temporary Internet files, files in the Recycle Bin and other temporary files that you may safely delete. 1. Click on Start > Computer. Right-click on the Gateway icon and select Properties. 2. Select the General tab and click on the Disk Cleanup button (next to the diagram of the disk drive. 3. Tick each category in the Files to delete area you wish to delete and click on OK.
Helpdesk - 73
Disk Defragmenter
With the creation and deletion of files over time, scattering occurs all over the hard disk area and affects performance. The Disk Defragmenter helps you rearrange the items stored on your hard drive to make your computer run faster and more efficiently. Running the Disk Defragmenter once a month (depending on computer usage) will decrease wear and tear on your hard drive and thus decrease the chance of a fault developing at a later date. 1. Perform a Disk Cleanup and close all open programs. 2. Click on Start > Computer. Right-click on the Gateway icon and select Properties. 3. Click on Tools and Defragment now.... 4. Click on the volume you want to defragment and click on Defragment to start. The whole process may take several hours to complete. It is best not to use your computer while running the Disk Defragmenter as any changes on your system may cause the process to restart. If your hard disk is divided into several partitions you should perform the same action for each partition.
74
Manage your hard disk drive (HDD) Check the remaining free space on your hard disk drive
1. Click on Start > Computer. 2. Right-click on the Gateway icon and select Properties. 3. The Hard Disk Properties window displays the amount of used space and free space on your hard disk. If your hard disk is almost full (less than 200 MB remaining), you should consider freeing some space. To see easily how much space is used and how much is left, simply place your pointer over the hard disk drive icon. The information will automatically appear.
Helpdesk - 75
2. Uninstall the programs you no longer use: Click on Start Features. > Control Panel > Programs > Programs and
3. Archive files on an external hard disk drive, recordable CDs or DVDs (if your computer is equipped with a CD or DVD writer) and delete them from the hard disk.
76
Windows System Restore. System Restore monitors changes to your computer and automatically
creates restore points that store your computers configuration each time a major change occurs (such as installing programs). It can undo harmful changes to your computer and restore settings and performance without removing your personal data files (such as documents, browsing history, photos, favorites, or emails).
Note: If you only need to uninstall a program, do not use System Restore. To uninstall a program use Programs and Features in the Control Panel. To start System Restore from the Windows desktop:
Click Start Restore. > All Programs > Accessories > System Tools > System
Helpdesk - 77
78
Updates
As new viruses, worms, and other threats are discovered every day, keeping your security applications and operating system up-to-date is crucial. To keep your computer safe and reliable:
Helpdesk - 79
Perform updates when prompted by Windows Action Center. Use Microsoft Windows Automatic Updates. Run Windows Update.
Internet security Norton Internet Security, combined with other security applications
can protect your computer from Internet attacks and ensure that the latest security updates have been downloaded and installed on your computer. Norton Internet Security performs automatic updates through Live Update. You can also start a manual update from the main interface of Norton Internet Security and the Live Update link.
Operating system, software and drivers Windows Update can help you
keep your computer up-to-date. It allows you to choose and download updates for your computer's operating system, software, and hardware. New content is added to Windows Update regularly, so you can always get the most recent updates and solutions to protect your computer and keep it running smoothly. Start
80
> Control Panel > System and Security > Windows Update.
You can access Remote Assistance by clicking on Start > All Programs > Maintenance > Windows Remote Assistance. Upon launching Remote Assistance, you will see a screen giving you the choice of either inviting someone to help you or offering to help someone.
Helpdesk - 81
R E C OV E R Y
GATEWAY RECOVERY MANAGEMENT
If your computer experiences problems that are not recoverable by other methods, you may need to reinstall the Windows operating system and factory-loaded software and drivers. To ensure you can recover your computer when needed, you should create a recovery backup as soon as possible.
82
2. To create recovery backup for the hard drives entire original contents, including Windows and all factory-loaded software and drivers, click Create Factory Default Disc, or if your computer has no optical drive, Create Factory Default Backup. - OR To create recovery discs for only the factory-loaded software and drivers, click Create Drivers and Applications Backup. Important: We recommend that you create each type of recovery disc as soon as possible.
Recovery - 83
This dialog box tells you the estimated size of the backup file. If you a using optical discs, it will also show the number of blank, recordable discs you will need to complete the recovery discs. Make sure that you have the required number of identical, blank discs. If you a using a USB disk, make sure is has enough capacity before continuing.
84
3. Plug in the USB disk or insert a blank disc into the drive indicated in the Backup to list, then click Next. You will be shown the backup progress on the screen.
4. Follow the process until it completes: If you a using optical discs, the drive ejects each disc as it completes burning it. Remove the disc from the drive and mark it with a permanent marker. If multiple discs are required, insert a new disc when prompted, then click OK. Continue until the process is complete. If you a using a USB disk, unplug the USB drive and mark it with a permanent marker. Important: Write a unique, descriptive label on each backup, such as Windows Recovery Backup or Apps/Drivers Recovery Backup.
Recovery - 85
Make sure you keep the backup in a safe place that you will remember.
For instructions, see Returning to a previous system condition on page 87. 3. Reset your system to its factory condition. If nothing else has solved the problem and you want to reset your system to factory condition, see Returning your system to its factory condition on page 90.
Types of recovery
Help: For more information about using Microsoft System Restore, click Start, then click Help and Support. Type windows system restore in the Search Help box, then press Enter. To return to a restore point:
1. Click on Start > Control Panel > System and Security > Action Center, then click on Recovery. 2. Click on Open System Restore, then Next.
Recovery - 87
3. Click on he restore point you want, click on Next, then Finish. A confirmation message box appears. 4. Click on Yes. Your system is restored using the restore point you specified. This process may take several minutes, and may restart your computer.
Opening the recovery tool If you are recovering using Windows and the recovery information stored on your computer:
Click on Start > All Programs > Gateway, then click on Gateway Recovery Gateway Recovery Management. Management opens.
88
Click on the Restore tab, then click Reinstall Drivers or Applications. The Gateway Application Recovery main menu opens.
If you are recovering from a driver and application recovery backup on optical discs:
Insert the driver and application recovery backup disc (Apps/ Drivers Recovery Backup) into the disc drive. Restart you computer and wait for the program to start, then go to "Reinstalling drivers or applications" on page 90.
If you are recovering from the driver and application recovery backup on a USB drive:
Insert the USB drive into a USB port. Open the USB drive in Windows Explorer and double-click Recovery.
Recovery - 89
Click Reinstall Drivers or Application from a USB device, then go to "Reinstalling drivers or applications" on page 90.
Caution: This complete recovery deletes everything on your hard drive, then reinstalls Windows and all software and drivers that were pre-installed on your system. If you can access important files on your hard drive, back them up now.
If you can still run Windows, see Recovering from within Windows below. If you cannot run Windows and your original hard drive is still working, see Recovering from the hard drive during startup on page 92. If you cannot run Windows and your original hard drive has been completely re-formatted or you have installed a replacement hard drive, see Recovering from your recovery backup on page 92.
Caution: Continuing the process will erase all files on your hard
drive. 4. Click on OK. The recovery process begins by restarting your computer, then continues by copying files to your hard drive. This
Recovery - 91
process may take a while, but a Gateway Recovery Management screen shows you its progress. When the recovery has finished, a dialog box prompts you to restart your computer. 5. Click on OK. Your computer restarts. 6. Follow the on-screen prompts for first-time system setup.
Caution: Continuing the process will erase all files on your hard
drive. 3. Click on Next. Your hard drives original, factory-loaded contents are recovered. This process will take several minutes.
Caution: Continuing the process will erase all files on your hard
drive. 2. If it is not already enabled, you must enable the F12 Boot Menu: 1. Press F2 when starting your computer. 2. Use the left or right arrow keys to select the Main menu. 3. Press the down key until F12 Boot Menu is selected, press F5 to change this setting to Enabled. 4. Use the left or right arrow keys to select the Exit menu. 5. Select Save Changes and Exit and press Enter. Select OK to confirm. 6. Your computer will restart. 3. During startup, press F12 to open the boot menu. The boot menu allows you to select which device to start from, such as the hard drive or an optical disc. 4. Use your arrow keys to select the line CDROM/DVD or USB HDD, then press Enter. Windows installs from the recovery backup instead of the normal startup process. 5. Follow the on-screen prompts to complete the recovery.
Recovery - 93
REGULATORY INFORMATION
WIRELESS DEVICES
Caution: Wireless devices are not user-serviceable. Do not modify them in any
way. Modification to a wireless device will void the authorization to use it. Contact Gateway for service information.
Caution: The transmitting device embedded in this computer may not be used
with any antenna other than the one provided with the computer. Warning: Using wireless devices while flying in aircraft is prohibited. Switch off all devices before boarding an aircraft; they may be dangerous to the operation of the aircraft, disrupt communications, and even be illegal. FEDERAL COMMUNICATIONS COMMISSION (FCC) INTENTIONAL EMITTER PER FCC PART 15 Low power, Radio transmitter type devices (radio frequency (RF) wireless communication devices), operating in the 2.4 GHz band and/or 5.15 5.35 GHz band, may be present (embedded) in your computer system. This section is only applicable if these devices are present. Refer to the system label to verify the presence of wireless devices. Wireless devices that may be in your system are only qualified for use in the United States of America if an FCC ID number is on the system label. Operation of this device is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation of the device. UNINTENTIONAL EMITTER PER FCC PART 15 This device has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This
94
equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio or television reception. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause interference to radio and television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures: Reorient or relocate the receiving antenna. Increase the separation between the equipment and receiver. Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. Consult the dealer or an experienced radio/TV technician for help. Compliance accessories The accessories associated with this equipment are: shielded video cable when an external monitor is connected. These accessories are required to be used in order to ensure compliance with FCC rules. CALIFORNIA PROPOSITION 65 WARNING This product contains chemicals known to the State of California to cause cancer, birth defects, and/or other reproductive harm. For additional information regarding this product warning, go to www.gateway.com/prop65. MERCURY WARNING THE LAMP IN THIS DISPLAY CONTAINS MERCURY. DISPOSE ACCORDING TO LOCAL, STATE, AND FEDERAL LAW.
Regulatory information - 95
TELECOMMUNICATIONS PER PART 68 OF THE CODE OF FEDERAL REGULATIONS (CFR 47) (APPLICABLE TO PRODUCTS FITTED WITH USA MODEMS) Your modem complies with Part 68 of the Code of Federal Regulations (CFR 47) rules. On the computer or modem card is a label that contains the FCC registration number and Ringer Equivalence Number (REN) for this device. If requested, this information must be provided to the telephone company. A telephone line cord with a modular plug is required for use with this device. The modem is designed to be connected to the telephone network or premises wiring using a compatible modular jack which is Part 68-compliant. See installation instructions for details. The Ringer Equivalence Number (REN) is used to determine the number of devices which may be connected to the telephone line. Excessive RENs on a telephone line may result in the devices not ringing in response to an incoming call. In most areas, the sum of RENs should not exceed five (5). To be certain of the number of devices that may be connected to a line, as determined by the total RENs, contact the local telephone company. If this device causes harm to the telephone network, the telephone company will notify you in advance that temporary discontinuance of service may be required. The telephone company may request that you disconnect the equipment until the problem is resolved. The telephone company may make changes in its facilities, equipment, operations, or procedures that could affect the operation of this equipment. If this happens, the telephone company will provide advance notice in order for you to make necessary modifications to maintain uninterrupted service. This equipment cannot be used on telephone company-provided coin service. Connection to party line service is subject to state tariffs. Contact the state public utility commission or public service commission for information. When programming or making test calls to emergency numbers: Remain on the line and briefly explain to the dispatcher the reason for the call.
96
Perform such activities in the off-peak hours such as early morning or late evenings. The United States Telephone Consumer Protection Act of 1991 makes it unlawful for any person to use a computer or other electronic device to send any message via a telephone fax machine unless such message clearly contains, in a margin at the top or bottom of each transmitted page or on the first page of the transmission, the date and time it is sent, an identification of the business, other entity, or other individual sending the message, and the telephone number of the sending machine or such business, other entity, or individual. Refer to your fax communication software documentation for details on how to comply with the fax-branding requirement. INDUSTRY CANADA (IC) INTENTIONAL EMITTER PER RSS 210
Regulatory information - 97
Le prsent appareil numrique nmet pas de bruits radiolectriques dpassant les limites applicables aux appareils numriques de Classe B prescrites dans le rglement sur le brouillage radiolectrique dict par Industrie Canada. TELECOMMUNICATIONS PER INDUSTRY CANADA CS-03 (FOR PRODUCTS FITTED WITH AN ICCOMPLIANT MODEM) The Industry Canada label identifies certified equipment. This certification means that the equipment meets certain telecommunications network protective, operation, and safety requirements. The Department does not guarantee the equipment will operate to the users satisfaction. Before installing this equipment, users should make sure that it is permissible to be connected to the facilities of the local telecommunications company. The equipment must also be installed using an acceptable method of connection. In some cases, the inside wiring associated with a single-line individual service may be extended by means of a certified connector assembly. The customer should be aware that compliance with the above conditions may not prevent degradation of service in some situations. Repairs to certified equipment should be made by an authorized Canadian maintenance facility designated by the supplier. Any repairs or alterations made by the user to this equipment, or equipment malfunctions, may give the telecommunications company cause to request the user to disconnect the equipment.
Warning: To avoid electrical shock or equipment malfunction do not attempt to make electrical ground connections by yourself. Contact the appropriate inspection authority or an electrician, as appropriate.
Users should make sure, for their own protection, that the electrical ground connections of the power utility, telephone lines, and internal metallic water pipe system, if present, are connected together. This precaution may be particularly important in rural areas.
98
The Ringer Equivalence Number (REN) assigned to each terminal device provides an indication of the maximum number of terminals allowed to be connected to a telephone interface. The termination on an interface may consist of any combination of devices subject only to the requirement that the sum of the Ringer Equivalence Numbers of all the devices does not exceed 5. (JAPAN) VCCI Japanese modem notice CE COMPLIANCE REQUIREMENT Products with the CE marking comply with both the Electromagnetic Compatibility Directive (2004/108/EC) and the Low Voltage Directive (2006/95/EC) issued by the Council of the European Communities. Compliance with these directives implies conformity to the following European Standards: EN55022: Radio disturbance characteristics EN55024: Immunity characteristics EN61000-3-2: Limitation of harmonic current emissions EN61000-3-3: Limitation of voltage fluctuation and flicker in low-voltage supply system
Regulatory information - 99
EN60950-1: Product Safety. If your computer includes a telecommunication network board, the input/output socket is classified as Telecommunication Network Voltage (TNV-3). Note for computers equipped with wireless controllers and wired modems: Hereby, Gateway, declares that the wireless devices provided with this computer include a low power radio transmitter in full compliance with the essential requirements and other relevant provisions of Directive 1999/05/EC for Low Voltage, EMC and RF of the R&TTE. EN300328 - Electromagnetic compatibility and Radio spectrum Matters (ERM). EN301489-1/-7/-17/-24 - EMC standard for radio equipment and services, common technical requirements. EN301893 - Broadband Radio Access Network, 5GHz high performance RLAN, harmonized EN covering essential requirements of article 3.2 of R&TTE directive. EN62311 - Generic standard to demonstrate the compliance of low power electronic and electrical apparatus with the basic restrictions related to human exposure to electromagnetic fields. List of applicable countries This product must be used in strict accordance with the regulations and constraints in the country of use. For further information, contact the local office in the country of use. Please see http://ec.europa.eu/enterprise/rtte/implem.htm for the latest country list. MODIFICATIONS TO THE PRODUCT CE Marking Gateway cannot be held responsible for unauthorized modifications made by the user and the consequences thereof, which may alter the conformity of the product with the CE Marking.
100
Radio frequency interference The manufacturer is not responsible for any radio or TV interference caused by unauthorised modifications to this equipment. CONNECTIONS AND REMOTE EARTHS PELV (Protected Extra Low Voltage) To ensure the extra-low voltage integrity of the equipment, only connect equipment with mains-protected electrically-compatible circuits to the external ports. SELV (Safety Extra Low Voltage) Every input and output of this product is classified as Safety Extra Low Voltage. Remote earths To prevent electrical shock, connect all local (individual office) computers and computer support equipment to the same electrical circuit of the building wiring. If you are unsure, check the building wiring to avoid remote earth conditions. Building supply Only connect the equipment to a building supply that is in accordance with current wiring regulations in your country. In the U.K., these are the IEE regulations. POWER SUPPLY AND CABLES Power supply The power supply socket-inlet and socket-outlet (if equipped) are classified as Hazardous Voltage. You must unplug the power supply cord and remove the battery to disconnect the equipment from the power supply. In that aim, the socket-outlet should be installed near to the equipment and should be easily accessible. Input rating: Refer to the rating label on the bottom of the computer and ensure that your power adapter complies with the specified rating.
Under no circumstances should the user attempt to disassemble the power supply. The power supply has no user-replaceable parts. Inside the power supply are hazardous voltages that can cause serious personal injury. A defective power supply must be returned to your dealer. Power cables and plug This Product requires a three-wire grounded power cord and plug. The plug only fits in a grounded power outlet. Make sure the power outlet is properly grounded before inserting the plug. Do not insert the plug into a non-grounded power outlet. Contact your electrician for details. The cord length must not exceed 2.5 metres. To prevent electrical hazards, do not remove or disable the ground contact on the power cord. Replace the power cord if it gets damaged. Contact your dealer for an exact replacement. In Europe, the plug must be rated for 250 VAC, 10 amp minimum. The plug must display an international agency approval marking. The cord must be suitable for use in the end-user country. Consult your dealer or the local electrical authorities if you are unsure of the type of power cord to use in your country. Cables For cables which are not delivered with the Product in the computer's packaging: The EMC performance of the system is guaranteed only if the cable and interface use efficient shielding. The use of shielded interface cable is required for USB, IEEE1394, serial, printer, game, analog or digital audio/ video, PS2, TV or FM antennas, and generally all highspeed cable interfaces. Use only UL Listed No. 26AWG or larger telecommunication cords. Only Ethernet LAN or RTC modem cable can have length exceeding 3 metres. Gateway recommends that you add a ferrite core round clip to each cable connecting your computer to a hardware device that was not included with your computer. Ferrite reference: 28A-2029 from Steward (two loops)
102
During product certification, Gateway used the following cable quality: USB2.0 Certified Cables from Hama 46778 IEEE1394 shielded FireWire from Hama 50011 RCA-RCA shielded Audio/Video Cables from Thomson KHC001M, KHC012M, KHC028M Stereo Jack shielded Audio cables from Hama 43330H, 42714H Heat Build-up and Portable Computers The AC adapter and the underside of the computer can become hot after prolonged use. Sustained physical contact with either should be avoided. CHASSIS COVER REMOVAL AND REPLACEMENT Before removing the chassis cover to service or modify the equipment, you must disconnect all power and modem cords, and remove the battery. Caution: Some components inside the computer can become hot after prolonged use. You then must close the chassis before you plug in and switch on the equipment. LASER COMPLIANCE STATEMENT The optical devices are tested and certified to be compliant with International Electrotechnical Commission IEC60825-1 and European EN60825-1 standards for Class 1 laser products. Class 1 laser products are not considered hazardous. The optical devices are designed such that there is never human access to laser radiation above a Class 1 level during normal operation or prescribed maintenance conditions. The optical devices installed in your computer are designed for use solely as components of such electronic product and therefore do not comply with the appropriate requirements of Code of Federal Regulation Sec. 1040.10 and Sec. 1040.11 for COMPLETE laser products. Because exposure to laser radiation is extremely hazardous, under no circumstances should the user attempt to disassemble the laser device.
PACKAGING The packaging of this product is compliant with the European Environmental Directive 94/62/EC from December 20 th 1994 and its equivalent in the French Legislation by the Decree 98-638 from july 20 th 1998. COMPLIANT WITH RUSSIAN REGULATORY CERTIFICATION
104
ENVIRONMENT
OUR COMMITMENT TO ENVIRONMENTAL PROTECTION Environment has been at the heart of our products. Gateway is committed to limit the environmental impact of its products during product lifecycle. Starting at design phase, with a very strict procurement policy, maximum attention is given to electronic components in order to limit their weight in heavy metals such as lead, cadmium, chromium, mercury, etc. Suppliers are asked, for each part of any product, to respect all regulations. As far as end-of-life products are concerned, measures have been taken to anticipate and facilitate the recycling of all our products. Thus, all plastic parts heavier than 25 grams used in Gateway products are labelled ISO 11469. This label allows a quick recognition of the material and eases its valorisation. Likewise, desktop computers are designed to be easily dismantled, with screws being replaced by clips. PRODUCT DISPOSAL The 2002/96/EC Directive, known as Waste Electrical and Electronic Equipment (WEEE) Directive, requires that used electrical and electronic products must be disposed of separately from normal household waste in order to promote reuse, recycling and other forms of recovery and to reduce the quantity of waste to be eliminated with a view to reducing landfill and incineration. The crossed-out dustbin logo is there to remind you that these products must be sorted separately for disposal. These rules concern all Gateway products and also all accessories, such as keyboard, mouse, speakers, remote control, etc. When you have to dispose of such products, make sure that they are correctly recycled by checking
Environment - 105
with your local authority, or by returning your old equipment to your retailer if you are replacing it. For information, visit www.gateway.com/about/corp_responsibility/ environment.php. Battery disposal (when applicable) Before disposing of your equipment ensure that you have removed any batteries that may be fitted in the equipment. European law states that batteries must be collected for disposal separately from household waste. Do not throw your used batteries in the dustbin. Dispose of your used batteries via a battery collection scheme where available, or ask your distributor or local authority what infrastructures you can use. Your efforts will enable the safe collection, recycling and destruction of used batteries and will help protect the environment and reduce health hazards.
106
S O F T W A R E L IC E NS E
Note: Most of the software applications are already preinstalled on your Gateway computer. They are ready to use or to set up. However, some titles require a CD or DVD to run. You will find these discs in your computer's packaging.
Gateway License Agreement (CD and/or DVD Products). This copy of the original is your proof of license. Please treat it as valuable property. Important! Read carefully before installing the software. The following License Agreement applies to you. This is a legal agreement between you (either individual or an entity) and Gateway By installing the software you are agreeing to be bound by the terms of this Agreement. If you do not agree to the terms of this Agreement, promptly return your entire computer system, the unopened software packet(s), if any, as well as the accompanying terms (including written materials or other container(s)) in the place you obtained them for a full refund. GATEWAY SOFTWARE LICENSE 1. Grant of License This Gateway License Agreement (License) permits you to use one copy of the specified version of the Gateway SOFTWARE identified above (which may include at least one CD or DVD disc) on any single computer, provided the SOFTWARE is in use on only one computer at any time. If you have multiple Licenses for the SOFTWARE, then at any time you may have as many copies of the SOFTWARE in use as you have Licenses. The SOFTWARE is in use on a computer when it is loaded into the temporary memory (i.e. RAM) or installed in the permanent memory (e.g. hard disk, CD and/or DVD, or other storage device of that computer, except that a copy installed on a network server for the sole purpose of distribution of other computer
is not in use. If the anticipated number of users of the SOFTWARE will exceed the number of applicable Licenses, then you must have a reasonable mechanism or process in place to assure that the number of persons using the SOFTWARE concurrently does no exceed the number of Licenses. If the SOFTWARE is permanently installed on the hard disk or the storage device of a computer (other than a network server) and one person uses that computer more than 80% of the time it is in use, then that person may also use the SOFTWARE on a portable or home computer. 2. Copyright The SOFTWARE is owned by Gateway or its suppliers and is protected by United States copyright laws and international treaty provision. Therefore, you must treat the SOFTWARE like any other copyrighted material (e.g. a book or musical recording) except that you may transfer the CD and/or DVD disc portion of the SOFTWARE, if any, to a single hard disk provided you keep the original solely for backup or archival purposes. You may not copy the CD and/or DVD disc portion of the SOFTWARE or the written materials accompanying the SOFTWARE. 3. Other restrictions You may not rent or lease the SOFTWARE, but you may transfer the SOFTWARE and accompanying written materials on a permanent basis provided you retain no copies and the recipient agrees to the terms of this Agreement. You may not reverse engineer, decompile or disassemble the SOFTWARE. Any transfer of the SOFTWARE must include the most recent update and all prior versions. THIRD PARTY SOFTWARE OR FREE SOFTWARE LICENSE INFORMATION Software pre-loaded, embedded or otherwise distributed with the products provided by Gateway does contain free or third party software programs (the Free Software), which are licensed under the terms GNU General Public License (the GPL). The Free Software is marked as such. Your copying, distribution and/or modification of the Free Software shall be subject to the terms of the GPL.
108
The Free Software is distributed in the hope that, but it will be useful WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. The provisions of the GNU General Public License shall always apply. You may access http://www.gnu.org directly to obtain a copy of the GPL or write to the free Software Foundation, Inc. and request a copy. The address of the Free Software Foundation, Inc is: 59 Temple Place - Suite 330, Boston, MA, 02111-1307, USA. For a period of three (3) years as commencing from your receipt of this software, you may obtain a complete machine-readable copy of the source code for the Free Software under the terms of the GPL without charge except for the cost of media, shipping, and handling, upon a written request to us. Contact us if you have any further questions. Our mailing address is 8F, 88, Sec. 1, Hsin Tai Wu Rd., Hsichih, Taipei Hsien 221, Taiwan.
I NDEX
A
Audio CDs .............................................................. 39 Autoplay ................................................................. 41
B
Batteries ............................................................... 106 maximizing life .......................................... battery disposal ............................................... 106 optimizing..................................................... battery pack removing ....................................................... battery-low warning ............................... 35 using the first time .................................. characteristics .............................................. 31 Blu-ray ...................................................................... charging ......................................................... 34 brightness hotkeys............................................................ checking charge level ............................. 34 installing......................................................... 33 Browser ................................................................... low conditions ............................................ 36
31 34 34 32 40 18 55
C
features .......................................................... 14 Cables ................................................................ 9, 101 charging on indicator.................................................. 17 checking level.............................................. 34 Computer environment.................................... 8 Cleaning your computer ............................... 10 connections network .......................................................... 26 Codec ........................................................................ 42 computer
D
Memory card reader ............................... 25 Disk Cleanup......................................................... 73 Disk Defragmenter ........................................... 74 DSL ............................................................................. 51 Display DVD ........................................................................... 42 hotkeys ............................................................ 18 DVD movies playing ............................................................ 42 Download .............................................................. 41 Drives
110
E
Electronic Program Guide ............................ 40 Epilepsy warning ............................................... 13 Environment ...................................................... 105 Error checking ..................................................... 72
F
Firewall ............................................................. 60, 67
H
HDD (Hard Disk Drive) Health precautions ........................................... 11 Free space ...................................................... 73 Helpdesk ................................................................. 72 Management ............................................... 75 hotkeys .................................................................... 19
I
Interference ....................................................... 101 Firewall .................................................... 60, 67 Internet Internet Service Provider (ISP) ................... 50 Connection ................................................... 50
K
Keyboard hotkeys............................................................ 19
L
LAN (Local Area Network) ........................... 52 Last Known Good Configuration ............ 79
M
Maintenance Memory card reader........................................ 25 HDD management ................................... 75 Modem .................................................................... 51 System tools ................................................. 76 Multimedia files ................................................. 38 Malware .................................................................. 60
N
network ................................................................... 26 Norton Internet Security ........................ 58, 62 Network connections ...................................... 52
Index - 111
P
ports .......................................................................... 25 PowerDVD ............................................................. 40 Power cords ............................................................. 9
R
Recovery Removing hardware ........................................ 26 System Restore ........................................... 77 Removing software .......................................... 75 Regulatory Information....................... 94, 105 Restore points ..................................................... 78 Removable media devices ............................ 26
S
Safe Computing.................................................. 72 Safety precautions ............................................... 8 Security Antivirus ......................................................... 60 Updates .................................................... 69, 79 Windows Action Center ................. 67, 79 Social Networks .................................................. 49 Software Removing software ................................. 75 Software License .................................... 107 TV tuner .................................................................. 38 speakers hotkey ............................................................. Spyware .................................................................. System Restore .................................................... System tools Disk Cleanup ................................................ Disk Defragmenter .................................. Error checking ............................................ Windows System Restore .....................
18 59 77 73 74 72 77
T U
Windows automatic updates ..... 69, 80 Uninstalling hardware.................................... 26 universal serial bus ........................................... 27 User Account Control ..................................... 70 Update
V
view front .................................................................. 20 left ..................................................................... 20 rear .................................................................... 20
112
right .................................................................. 21
W
Warranty.................................................................... 7 Welcome Center ................................................ 37 WiFi ............................................................................ 52 Windows System Restore ........................................... 77 Using Windows .......................................... 37 Welcome Center ........................................ 37 Windows Action Center ......... 66, 67, 79 Windows automatic updates ..... 69, 80 Windows Defender ................................. 69 Windows Media Center ................. 38, 39 Windows Media Player .................. 38, 39 Windows Remote Assistance ............. 81
Index - 113