Acer Predator HELIOS 300 User Manual

Acer Predator HELIOS 300 User Manual

Hide thumbs Also See for Predator HELIOS 300:
Table of Contents

Advertisement

User's Manual

Advertisement

Table of Contents
loading

Summary of Contents for Acer Predator HELIOS 300

  • Page 1 User’s Manual...
  • Page 2 Sign up for an Acer ID and enjoy great benefits Open the Acer Portal app to sign up for an Acer ID or sign in if you already have an Acer ID. There are three great reasons for you to get an Acer ID: •...
  • Page 3: Table Of Contents

    Table of contents - 3 A B L E O F C O N T E N T S First things first Bluelight Shield Your guides ............ 6 Securing your computer Basic care and tips for using your Using a computer security lock..41 computer............
  • Page 4 4 - Table of contents How do I turn off my computer? ..66 Troubleshooting tips ......... 72 How do I unlock my computer? ..67 Error messages ..........72 How do I set the alarm? ......68 Internet and online security Where are my apps?........
  • Page 5 Getting started... In this section you will find: • Useful information on caring for your computer and your health • Where to find the power button, ports and connectors • Tips and tricks for using the touchpad and keyboard • How to create recovery backups •...
  • Page 6: First Things First

    Once you have connected to the internet, you can download updates for your computer from: http://go.acer.com/?id=17883 1. The link will open the Predator Service & Support webpage. 2. Scroll down to Drivers and Manuals and search for your model by pasting in or manually entering the serial number, SNID, or product model.
  • Page 7: Basic Care And Tips For Using Your Computer

    Your computer will serve you well if you take care of it. • Only use the adapter provided with your device, or an Acer-approved adapter to power your device. • Do not expose the computer to direct sunlight. Do not place it near sources of heat, such as a radiator.
  • Page 8: Taking Care Of Your Ac Adapter

    8 - First things first • Do not expose the computer to rain or moisture. • Do not spill water or any liquid on the computer. • Do not subject the computer to heavy shock or vibration. • Do not expose the computer to dust or dirt. •...
  • Page 9: Your Predator Notebook Tour

    Your Predator notebook tour - 9 O U R R E D A T O R N O T E B O O K T O U R After setting up your computer as illustrated in the Setup Guide, let us show you around your new Predator computer. Screen view Icon Item Description...
  • Page 10: Keyboard View

    10 - Your Predator notebook tour Keyboard view Icon Item Description For entering data into your computer. Keyboard See "Using the keyboard" on page 14. Touch-sensitive pointing device. The touchpad and selection buttons form a single surface. Press down firmly on the Touchpad touchpad surface to perform a left click.
  • Page 11: Left View

    Your Predator notebook tour - 11 Left view 4 5 6 Icon Item Description Kensington Connects to a Kensington- lock slot compatible security lock. Connects to an Ethernet 10/ Ethernet (RJ- 100/1000-based network. 45) port Pull the lip down to open the port fully.
  • Page 12: Right View

    12 - Your Predator notebook tour Right view Icon Item Description Connects to audio devices (e.g., Headset/ speakers, headphones) or a speaker jack headset with microphone. USB ports Connect to USB devices. Power Indicates the computer’s power indicator status. Indicates the computer’s battery status.
  • Page 13: Base View

    Your Predator notebook tour - 13 Base view Icon Item Description Allows the computer to stay Ventilation cool. and cooling Do not cover or obstruct the openings. Houses the computer’s main storage. You may upgrade your Main storage computer’s main storage. compartment Predator recommends asking an approved service center to do...
  • Page 14: Using The Keyboard

    14 - Using the keyboard S I N G T H E K E Y B O A R D The keyboard has full-sized keys and a separate numeric keypad, separate cursor, lock, Windows, function and special keys. Lock keys The keyboard has lock keys which you can use to turn keyboard functions on and off.
  • Page 15 Using the keyboard - 15 Hotkey Icon Function Description Switches display output Display between the display screen, Fn + F5 toggle external monitor (if connected) and both. Turns the display screen Fn + F6 Display off backlight off to save power. Press any key to return.
  • Page 16: Windows Keys

    16 - Using the keyboard Windows keys The keyboard has two keys that perform Windows-specific functions. Description Pressed alone it returns to the Start screen or to return to the last open app. Windows key It can also be used with other keys for special functions, please check Windows Help.
  • Page 17: Using The Precision Touchpad

    Using the Precision Touchpad - 17 S I N G T H E R E C I S I O N O U CH P A D The touchpad controls the arrow (or 'cursor') on the screen. As you slide your finger across the touchpad, the cursor will follow this movement.
  • Page 18: Changing Touchpad Settings

    18 - Using the Precision Touchpad Two-finger pinch Zoom in and out of photos, maps and documents with a simple finger-and-thumb gesture. Three-finger press Lightly tap the touchpad with three fingers to open Cortana (if your computer supports Cortana) or open the Action Center (if your computer does not support Cortana).
  • Page 19 Using the Precision Touchpad - 19 1. In the icon tray in the lower right-hand corner of the screen, select Notifications icon open Notifications pane. 2. Select All settings. 3. Select Devices > Mouse & touchpad. 4. Now you can adjust the settings to suit your personal needs.
  • Page 20 20 - Using the Precision Touchpad...
  • Page 21: Recovery

    Predator provides Acer Care Center, which allows you to reset your PC, refresh your PC, or create a factory default backup. Note Acer Care Center is only available with a pre-installed Windows operating system. Important We recommend that you create a Factory Default Backup as soon as possible.
  • Page 22 22 - Recovery 2. Select the Backup tab and click Get Started for Create Factory Default Backup to open the Recovery Drive window. 3. Make sure Backup system files to the recovery drive is selected and click Next. 4. Plug in the USB drive and wait for the PC to detect the USB drive then click Next.
  • Page 23 Recovery - 23 • Since the recovery backup requires at least 8 GB of storage after formatting, it is recommended to use a USB drive with a capacity of 16 GB or larger. 5. Everything on the drive will be deleted. Click Create to continue.
  • Page 24: Backing Up Your Wireless And Lan Drivers

    24 - Recovery Backing up your wireless and LAN drivers Back up your wireless and LAN drivers. You can use these backups to install the wireless and LAN drivers if you install another operating system. 1. From Start, select All apps then Predator. Select Predator Recovery Management in the list of Predator apps.
  • Page 25 Recovery - 25 3. Select Keep my files to refresh your PC and reinstall your operating system without removing your personal files. Click Next to continue. Important If you have apps installed on your PC, they will be removed. 4. Resetting the PC will reinstall Windows, change settings back to their factory defaults and remove all preinstalled apps and programs without removing your personal files.
  • Page 26: Reset This Pc And Remove Everything

    26 - Recovery Reset this PC and remove everything 1. From Start, select All apps then Predator. Select Predator Recovery Management in the list of Predator apps. 2. Select the Restore tab and click Get Started to Choose an option. 3.
  • Page 27 Recovery - 27 keeping your computer. This process will take longer, but will be more secure. Warning Selecting "Remove files and clean the drive" will remove all of your personal files and accounts, along with pre-existing drivers that may affect your Windows installation. 5.
  • Page 28: 28 - Using A Bluetooth Connection

    28 - Using a Bluetooth connection S I N G A L UE T O O T H C O N N E C T I O N Bluetooth is a technology enabling you to transfer data wirelessly over short distances between many different types devices.
  • Page 29 Using a Bluetooth connection - 29 Bluetooth on your computer is disabled by default. To enable your computer’s Bluetooth adapter, do the following: 1. Press the Windows key or select the Windows Start button > Settings > Devices > Bluetooth, and click the toggle under Bluetooth to enable/disable it.
  • Page 30 30 - Using a Bluetooth connection 4. A code displays on your computer, which should match the code displayed on your device. Select Yes. Then, accept the pairing from your device. Note Some devices using older versions of the Bluetooth technology require both devices to enter a PIN.
  • Page 31: Connecting To The Internet

    Connecting to the Internet - 31 O N N E CT I N G T O T H E N T E R N E T This chapter includes general information on types of connections, and getting connected to the internet. For detailed information, please refer to Network connections on page 91.
  • Page 32 32 - Connecting to the Internet Predator notebook computers feature an Airplane mode hotkey that turns the network connection on or off. You can use the network management options to turn your wireless network on/off or control what is shared over the network. To connect to a wireless network, please follow the steps below.
  • Page 33 Connecting to the Internet - 33 4. Select Network & internet. 5. Make sure Wi-Fi is On and select Show available networks. 6. You will see a list of available wireless networks. Select the one you wish to use.
  • Page 34 34 - Connecting to the Internet 7. Once you select a wireless network, select Connect. 8. If required, enter the network’s password.
  • Page 35: Connecting With A Cable

    Connecting to the Internet - 35 Connecting with a cable Built-in network feature If your computer has a network port, plug one end of a network cable into the network port on your computer, and the other end into a port on your router (refer to the image below.) Then, you'll be ready to get online.
  • Page 36: 36 - Predatorsense

    36 - PredatorSense R E D A T O R E N S E PredatorSense helps you to gain the edge in your games by allowing you to overclock processors and control cooling. Additional settings increase your key control by allowing you to turn off sticky keys and the Windows/Menu keys.
  • Page 37: Overclocking

    30%, overclocking options will be disabled until the AC adapter is reconnected and battery charge is over 30%. Note Acer is not responsible for any damage incurred from overclocking if any third party tools are used to overclock the CPU or graphics besides PredatorSense. Warning Your computer is designed to support GPU overclocking.
  • Page 38: Predatorsense Settings

    38 - PredatorSense If you select Custom, then you will see two sliders that allow you to set CPU and GPU cooling independently. CoolBoost™ Turn CoolBoost™ on to increase the maximum fan speed, enabling even faster fan speeds and increased cooling during heavy use.
  • Page 39: Bluelight Shield

    Bluelight Shield - 39 L U E L I G H T H IE L D The Bluelight Shield can be enabled to reduce blue-light emissions from the screen to protect your eyes. To configure the Bluelight Shield, Search for ’Predator Quick Access’...
  • Page 40 Keeping your computer and data safe... In this section you will find: • How to secure your computer • Setting passwords • What you need to prepare when you’re traveling • How to get the most out of your battery...
  • Page 41: Securing Your Computer

    Securing your computer - 41 E C U R I N G Y O U R C O M P U T E R Your computer is a valuable investment that you need to take care of. Learn how to protect and take care of your computer.
  • Page 42: Entering Passwords

    42 - Securing your computer password checkpoints on boot-up and resume from Hibernation (if available) for maximum security. Important Do not forget your Supervisor Password! If you forget your password, please get in touch with your dealer or an authorized service center.
  • Page 43: Bios Utility

    BIOS utility - 43 B I O S U T I L I T Y The BIOS utility is a hardware configuration program built into your computer's BIOS. Your computer is already properly configured and optimized, and you do not normally need to run this utility. However, if you encounter configuration problems, you may need to run To activate the BIOS utility, press F2 while the computer logo is being displayed.
  • Page 44: Power Management

    44 - Power management O W E R M A N A G E M E N T This computer has a built-in power management unit that monitors system activity. System activity refers to any activity involving one or more of the following devices: keyboard, mouse, hard disk, peripherals connected to the computer, and video memory.
  • Page 45 Power management - 45 5. Select Change settings that are currently unavailable. 6. Scroll down and disable Turn on fast startup. 7. Select Save changes.
  • Page 46: Battery Pack

    46 - Battery pack A T T E R Y P A C K The computer uses an embedded Lithium battery that gives you long use between charges. Battery characteristics The battery is recharged whenever you connect the computer to the AC adapter. Your computer supports charge-in-use, enabling you to recharge the battery while you continue to operate the computer.
  • Page 47: Optimizing Battery Life

    Battery pack - 47 Follow these steps again until the battery has been charged and discharged three times. Use this conditioning process for all new batteries, or if a battery hasn't been used for a long time. Warning Do not expose battery packs to temperatures below 0° C (32° F) or above 45°...
  • Page 48: Checking The Battery Level

    48 - Battery pack • Excessive recharging decreases the battery life. • Look after your AC adapter and battery. Checking the battery level The power meter indicates the current battery level. Rest the cursor over the battery/power icon on the taskbar to see the battery's present charge level.
  • Page 49: Traveling With Your Computer

    Traveling with your computer - 49 R A V E L I N G W I T H Y O U R C O M P U T E R This section gives you tips and hints to consider when moving around or traveling with your computer.
  • Page 50: What To Bring To Meetings

    50 - Traveling with your computer Press the Windows key + C, click Settings > Power then click Shut Down You can put the computer in Sleep mode by pressing the Sleep hotkey or by closing the display. When you are ready to use the computer again, open the display and, if necessary, press and release the power button.
  • Page 51: What To Take With You

    Traveling with your computer - 51 • Pack the computer in a protective case that can prevent the computer from sliding around and cushion it if it should fall. Warning Avoid packing items next to the top cover of the computer. Pressure against the top cover can damage the screen.
  • Page 52: Traveling With The Computer

    52 - Traveling with your computer a second AC adapter, you can avoid carrying the extra weight to and from home. If you use your computer at home for significant periods of time, you might also want to add an external keyboard, monitor or mouse.
  • Page 53: Traveling Internationally

    Traveling with your computer - 53 • If possible, have the computer inspected by hand. Airport security X-ray machines are safe, but do not put the computer through a metal detector. Traveling internationally Important Check with your airline for any special requirements for travelling with Lithium batteries.
  • Page 54 54 - Traveling with your computer compatible with the local AC voltage. Do not use converter kits sold for appliances to power the computer. • If you are using the modem, check if the modem and connector are compatible with the telecommunications system of the country you are traveling in.
  • Page 55 Ports and connectors... In this section you will find: • Information on the ports and connectors fitted to your computer...
  • Page 56: Universal Serial Bus (Usb)

    56 - Universal Serial Bus (USB) ( U S B ) N I V E R S A L E R I A L The USB port is a high-speed port which allows you to connect USB peripherals, such as a mouse, an external keyboard, additional storage (external hard disks), or any other compatible device.
  • Page 57: Usb Type-C Port

    The Type-C port is reversable; connectors may be inserted with either side up. Note On Acer computers USB Type-C ports support up to USB 3.1 (SuperSpeed USB, 5 Gbps). Other USB or Thunderbolt devices with a USB Type-C connector are supported, but transfer speed may be reduced and certain functions will be disabled (such as Thunderbolt video support).
  • Page 58: Sd Card Reader

    58 - SD card reader C A R D R E A D E R SD (Secure Digital) cards are used in a wide selection of digital cameras, tablets, media players and cellular phones. Inserting an SD card 1. Align the card so that the connector points towards the port, with the connectors facing down.
  • Page 59: Video And Audio Connectors

    Video and audio connectors - 59 I D E O A N D A U D I O C O N N E C T O R S Add an external monitor to your computer via a video port. The type of port available depends on your computer’s configuration.
  • Page 60: Hdmi

    60 - HDMI H DM I HDMI (High-Definition Multimedia Interface) is a high- quality, digital audio/video interface. HDMI allows you to connect any compatible digital audio/video source, such as your computer, a set-top box, DVD player, and audio/video receiver to any compatible digital audio and/or video monitor, such as a digital television (DTV) with a single cable.
  • Page 61 Got a question? In this section you will find: • Frequently asked questions • Tips for using Windows 10 • Troubleshooting information • How to protect yourself while online • Where find Predator service center contact information...
  • Page 62: Frequently Asked Questions

    62 - Frequently asked questions R E Q U E N T L Y A S K E D Q U E S T I O N S The following is a list of possible situations that may arise during the use of your computer. Easy solutions are provided for each one.
  • Page 63 Frequently asked questions - 63 • The computer may be in Sleep or Hibernate mode (if there is a power LED, it will flash). Press and release the power button to resume. No audio is heard from the computer. Check the following: •...
  • Page 64: Requesting Service

    Attach your proof-of-purchase to the ITW passport. If the country you are traveling in does not have an Predator-authorized ITW service site, you can still get in contact with offices worldwide. Please visit www.acer.com.
  • Page 65 Frequently asked questions - 65 Before you call Please have the following information available when you call Predator for online service, and please be at your computer when you call. With your support, we can reduce the amount of time a call takes and help solve your problems efficiently.
  • Page 66: Tips And Hints For Using Windows 10

    F r e q u en tl y a sk 66 - Frequently asked questions Tips and hints for using Windows 10 We know this is a new operating system that will take some getting used to, so we've created a few pointers to help you get started.
  • Page 67: How Do I Unlock My Computer

    Frequently asked questions - 67 How do I unlock my computer? Press the space bar and select a user account icon to unlock the computer. If your account has a password set, you will need to enter the password to continue. Can I personalize the Lock screen? You can personalize the lock screen with a different image, to run a slideshow of images, or to show you quick status...
  • Page 68: How Do I Set The Alarm

    68 - Frequently asked questions can drag the tile to an existing group on Start. You can give the group(s) a name and arrange the tiles within the groups to suit your needs. Can I make tiles bigger or smaller? Yes, you can.
  • Page 69: Where Are My Apps

    Frequently asked questions - 69 9. Select On or Off to activate or deactivate the alarm. Hour Minutes Save Delete Note The alarm will only sound if your computer is awake at the set time. Where are my apps? Move your cursor to the lower left-hand corner of the screen and select Search, start typing the name of the app you would like to open.
  • Page 70: What Is A Microsoft Id (Account)

    70 - Frequently asked questions How do I install apps? You can download Windows Store apps from Store. You will need to have a Microsoft ID to purchase and download apps from Store. I can't find apps like Notepad and Paint! Where are they? Move your cursor to the lower left-hand corner of the screen and select Search.
  • Page 71: Where Can I Get More Information

    Frequently asked questions - 71 Where can I get more information? For more information please visit the following pages: • Windows 10 information: go.acer.com/windows-tutorial • Support FAQs: support.acer.com...
  • Page 72: Troubleshooting

    F r eq ue nt ly as k e d qu est i o ns 72 - Frequently asked questions Troubleshooting This chapter shows you how to deal with common system problems. Read it before calling a technician if a problem occurs. Solutions to more serious problems require opening up the computer.
  • Page 73 Frequently asked questions - 73 Error messages Corrective action Hard disk 0 Contact your dealer or an authorized extended type service center. error Contact your dealer or an authorized I/O parity error service center. Keyboard error or Contact your dealer or an authorized no keyboard service center.
  • Page 74: 74 - Internet And Online Security

    74 - Internet and online security N T E R N E T A N D O N L I N E S E C U R I T Y First steps on the net Protecting your computer It is vital to protect your computer from viruses and attacks over the internet (see Internet security software on page 78).
  • Page 75 Internet and online security - 75 Dial-up Some computers include a telephone dial-up (‘modem’) connector. This allows you to connect to the internet using your telephone line. With a dial-up connection, you cannot use the modem and the telephone simultaneously on a single phone line.
  • Page 76: Network Connections

    76 - Internet and online security internet while away from home. The socket for a SIM card may be built in to your computer, or may require an external device, such as a USB modem or even an appropriately equipped mobile phone. Note If your computer includes a SIM card slot, you require a compatible SIM card and a contract with a cellular provider.
  • Page 77 Internet and online security - 77 Components of a wireless LAN To set up your Wireless network at home you need to have the following: Access point (router) Access points (routers) are two-way transceivers that broadcast data into the surrounding environment. Access points act as a mediator between wired and wireless network.
  • Page 78: Surf The Net

    Predator website To get you started why not visit our website, www.acer.com. Predator is dedicated to provide you with on-going personalized support. Check out our Support section to get help tailored to your needs.
  • Page 79 Internet and online security - 79 Ensure your software is up to date Cybercriminals rely heavily upon software or platform vulnerabilities, as they are the easiest way to sneak malware into a user's device unnoticed, sometimes with little action user's part.
  • Page 80 80 - Internet and online security Common threats cybercriminals use Now you know a few very common ways cybercriminals try to sneak onto your device or trick you into providing private information to them directly. Here are a few of the types of malware they like to deploy once they've got into a device and what to do if you're ever infected.
  • Page 81 Internet and online security - 81 botnets aren't even aware that their computer's security has become compromised! What to do if you're infected: If you're infected you probably don't realize it as bots are notoriously quiet. Your Internet Service Provider might send you a notification alerting you that they found a threat on your network and that you need to remove the bot.
  • Page 82 82 - Internet and online security that is specifically targeted as valuable, and capture the data, such as your login credentials and passwords. Use a virtual private network (VPN) to ensure your privacy and anonymity are protected when you use public Wi-Fi. VPN services can encrypt all the data that you send and receive while using a public Wi-Fi hotspot, securing your information from hackers and other users of the same...
  • Page 83 Internet and online security - 83 infected by malicious software. However, do not blame every computer problem on a virus! If you suspect your computer is infected, the first thing to do is update, if you have not already done so, and run your antivirus and anti-spyware software.

This manual is also suitable for:

G3-571G3-572G3-573Ph317-51

Table of Contents