Getting to know your computer Using Windows and your software ....46 Top view - display ..........15 Internet security offer ....... 46 Top view - keyboard......... 16 Packard Bell Recovery Management..46 Front view............17 Left view ............19 Internet Right view............20 First steps on the net ........
T A R T I N G Y O U R COMPUTER Thank you for purchasing this Packard Bell computer! This guide has been designed to introduce you to the features of your computer and assist in your computing experience.
Packard Bell. AVING TROUBLE Packard Bell provides several options to support your purchase. Packard Bell support Make sure you write down your computer serial number, date and place of purchase and model name on the area provided in this guide;...
OMPUTER ASICS AFETY AND COMFORT Safety precautions Please follow the guidelines below to use your computer comfortably and to avoid health problems. Computer environment Make sure that the computer: • Is used on a stable surface, stand or table. A fall can seriously damage the computer.
Please note • Slots and openings are provided for ventilation to ensure reliable operation of the product and to protect it from overheating. These openings must not be blocked or covered. The openings should never be blocked by placing the product on a bed, sofa, rug or other similar surface.
• The power cable is connected to the computer before connecting the power cable to the AC power outlet. • The power cable is unplugged from the power outlet before disconnecting the power cable from the computer. • Three-pin power cords are connected to a grounded power outlet. •...
protect unused slots from dust, metal objects or other particles. Save the dummies for use when no cards are in the slots. Servicing your computer Do not attempt to service your computer yourself, as opening or removing covers may expose you to dangerous voltage or other risks. Refer all servicing to qualified service personnel.
• Your device and its enhancements may contain small parts. Keep them out of the reach of small children. • The computer and accessories may contain small parts. Keep them out of the reach of small children. • If you work or play for hours at a time, then make sure you take regular breaks.
• Ensure that the computer’s ventilation slots and openings are never obstructed or covered. Do not place the computer on a soft surface (such as a carpet, chair or bed) that may block ventilation slots. • Do not push objects of any kind into ventilation or case slots as they may touch dangerous voltage points or short-out parts that may result in a fire or electric shock.
ETTING T O KNOW Y O U R COM PU T E R After setting up your computer, as illustrated in the setup instructions, let us show you around your new Packard Bell computer. Packard Bell EasyNote TE69KB 14 - Getting to know your computer...
OP VIEW DISPLAY Icon Item Description Web camera for video communication. Webcam A light next to the Webcam indicates that the webcam is active. Also called Liquid-Crystal Display (LCD), Screen displays computer output. Microphone Internal microphone for sound recording. Getting to know your computer - 15...
OP VIEW KEYBOARD Icon Item Description Power button / Turns the computer on and off. Indicates the indicator computer's power status. For entering data into your computer. Keyboard - See "Using the keyboard" on page 24. Touch-sensitive pointing device which functions like a computer mouse.
Icon Item Description Click buttons (left The left and right side of the button function as and right) left and right selection buttons. RONT VIEW Icon Item Description Accepts Secure Digital (SD) cards. Card reader - Push to remove/install the card. Only one card can operate at any given time.
Icon Item Description Power indicator Indicates the computer's power status. Indicates the computer's battery status. - Charging: The light shows amber when the Battery indicator battery is charging. - Fully charged: The light shows blue when in AC mode. HDD indicator Indicates when the hard disk drive is active.
EFT VIEW Icon Item Description Connects to a Kensington-compatible Kensington lock slot computer security lock. - Wrap the computer security lock cable around an immovable object such as a table or handle of a locked drawer. Insert the lock into the notch and turn the key ...
Icon Item Description Connects to USB devices. - If a port is black, it is USB 2.0 compatible, if USB port it is blue it is also USB 3.0 compatible (see below). Connects to audio line-out devices (e.g., speakers, headphones). Headphones / - Supports compatible 3.5 mm headsets with speaker jack...
Icon Item Description Connects to USB devices. - If a port is black, it is USB 2.0 compatible, if USB ports it is blue it is also USB 3.0 compatible (see below). Optical drive Internal optical drive; accepts CDs or DVDs. Optical disk access Lights up when the optical drive is active.
ASE VIEW Icon Item Description Releases the battery for removal. Insert a Battery release latch suitable tool and slide to release. Memory Houses the computer's main memory. compartment Houses the computer's hard disk (secured with Hard disk bay screws). Speakers Deliver stereo audio output.
Icon Item Description Allows the computer to stay cool. Ventilation and cooling fan - Do not cover or obstruct the openings. Battery bay Houses the computer's battery pack. Getting to know your computer - 23...
SING TH E KEYBOARD The keyboard has full-sized keys and a numeric keypad, separate cursor, Windows, function and special keys. Lock keys and numeric keypad Note: Information in this section may not apply to your computer. The keyboard has three lock keys which you can toggle on and off. Lock key Description When Caps Lock is on, all alphabetic characters typed...
Special keys Your computer’s keyboard includes keys that activate special functions. The function of each key is clearly marked with an icon. Icon Function Description Activates a second function on certain keys. Hotkey for E.g. press the Fn key to activate the F1 to F12 second function keys.
Icon Function Description Stop Stop playing the selected media file. Previous Return to the previous media file. Next Jump to the next media file. Brightness down Decreases the screen brightness. Brightness up Increases the screen brightness. Opens the Social Networks application. Social If this application is not installed, the key will Networking...
Hotkeys The computer uses hotkeys (key combinations) to access function keys and navigation commands. To activate hotkeys, press and hold the Fn key (bottom left) before pressing the other key in the hotkey combination. Hotkey Function Description Fn + Special keys Function Activates the F1 to F12 keys.
Windows keys The keyboard has two keys that perform Windows-specific functions. Description Pressed alone it returns to the Start screen. Windows key It can also be used with other keys for special functions, please check Windows Help. This key has the same effect as clicking the right Application mouse button;...
OUCHPAD OUCHPAD BASICS The touchpad controls the arrow (or 'cursor') on the screen. As you slide your finger across the touchpad, the cursor will follow this movement. Press the left or right side of the button located beneath the touchpad to perform selection and execution functions.
OUCHPAD GESTURES Windows 8 and many applications support touchpad gestures that use one or more fingers. Note: Support for touchpad gestures depends on the active application. These allow you to control applications with a few simple gestures, such as: • Swipe in from edge: Access Windows tools by swiping into the center of the touchpad from the right, top or left.
PGRADING YOUR COMPUTER XPANDING THROUGH OPTIONS Your computer offers you many options for a complete computing experience. Connectivity options Ports allow you to connect peripheral devices to your computer. For instructions on how to connect different external devices to the computer, read the following section.
to use a program to access the contents of the card. Select an option here if it is appropriate, otherwise select Cancel. If the card contains no files, or unknown files, a window will open showing the contents of the card.
Built-in networking The built-in networking allows you to connect your computer to an Ethernet-based network. Connect an Ethernet cable from the Ethernet (RJ-45) port on the chassis of the computer to a network jack or hub on your network. ...
Video port Connect to a monitor with a VGA or DVI port (the type of connection supported depends on your computer’s configuration). The appropriate cable is usually included with the monitor. Follow these steps to connect an monitor to your computer: 1.
High-Definition Multimedia Interface (only for certain models) HDMI (High-Definition Multimedia Interface) is an industry-supported, uncompressed, all-digital audio/video interface. HDMI provides an interface between any compatible digital audio/ video source, such as a set-top box, DVD player, and A/V receiver and a compatible digital audio and/or video monitor, such as a digital television (DTV), over a single cable.
OWER SUPPLY POWER ADAPTER Your computer can use the supplied external power adapter (a power 'brick') to run on AC power. A power cable is provided that is appropriate for the country where the computer was purchased. The power adapter provides adequate power to run your computer and recharge the battery pack at the same time.
Warning: The AC adapter and the underside of the computer can become hot after prolonged use. This is normal, but may cause injury with prolonged contact. ATTERY PACK The computer uses a battery pack that gives you extended use between charges.
To maximize your battery’s life, you are advised to adhere to the recommendations set out below. Conditioning a new battery pack Before you use a battery pack for the first time, there is a “conditioning” process that you should follow: 1.
In addition, the useful lifespan of the battery is adversely affected by the following usage patterns: • Using the computer on constant AC power with the battery inserted. If you want to use constant AC power, you are advised to remove the battery pack after it is fully charged.
To install a battery pack: 1. Align the battery with the open battery bay; make sure that the end with the contacts will enter first, and that the top surface of the battery is facing up. 2. Slide the battery into the battery bay and gently push until the battery locks in place.
Optimizing battery life Optimizing battery life helps you get the most out of battery operation, prolonging the charge/recharge cycle and improving recharging efficiency. You are advised to follow the suggestions set out below: • Purchase an extra battery pack. • Use AC power whenever possible, reserving battery for on-the-go use. •...
When the battery-low warning appears, the recommended course of action depends on your situation: Situation Recommended Action 1. Plug the AC adapter into the computer, and then connect to the mains power supply. The AC adapter and 2. Save all necessary files. a power outlet are 3.
OWER MANAGEMENT This computer has a built-in power management unit that monitors system activity. System activity refers to any activity involving one or more of the following devices: keyboard, mouse, hard disk, peripherals connected to the computer, and video memory. If no activity is detected for a period of time, the computer stops some or all of these devices in order to conserve energy.
Your computer will also not start if it receives an instruction to start over a network (Wake on LAN). 1. Open the Desktop. 2. Click Power Options in the Notification area. 3. Select More Power Options. 4. Select Choose what the power buttons do. 5.
OF T WA RE SING INDOWS AND YOUR SOFTWARE Packard Bell computers include software to help you use your computer; the programs and categories available on your computer depend on the model purchased. Internet security offer It is vital to protect your computer from viruses and attacks over the Internet (see Security on page 53).
NTERNET IRST STEPS ON THE NET Protecting your computer It is vital to protect your computer from viruses and attacks over the Internet (see Internet security offer on page 46 and Security on page 53). A comprehensive Internet security program is offered when you first start your computer.
Connection types Depending your computer model, your location your communication needs, you have several ways to connect to the Internet. Dial-up Some computers include a telephone dial-up (‘modem’) connector. This allows you to connect to the Internet using your telephone line. With a dial- up connection, you cannot use the modem and the telephone simultaneously on a single phone line.
Cable A cable connection provides fast and always-on Internet service via a cable television line. This service is generally available in large cities. You can use your telephone and watch cable TV at the same time you are connected to the Internet. 3G (WWAN or 'Wireless Wide-Area Network') A 3G connection allows you to use cellular networks (such as those used by a mobile phone) to connect to the Internet while away from home.
Wireless networks A wireless LAN or WLAN is a wireless local area network, which may link two or more computers without using wires. Setting up a wireless network is easy and allows you to share files, peripheral devices and an Internet connection.
router with the subscription to their services. Read carefully the documentation supplied with your Access point/router for detailed setup instructions. Network cable (RJ45) A network cable (also called RJ45 cable) is used to connect the host computer to the access point (see illustration below); this type of cable may also be used to connect peripheral devices to the access point.
Diagram of a working network 1. Access point/router 2. Desktop computer 3. Modem 4. Printer 5. Portable computer 6. PDA/Smartphone 7. Network cables (RJ45) Turning on/off a wireless network connection Most computers feature a ‘WiFi’ button that turns the network connection on or off.
Security You are probably eager to explore everything the Internet has to offer. In order for you to be safe online, Packard Bell has pre-installed Symantec’s award-winning Norton Internet Security™ on your computer. Internet - 53...
Trojan horses, worms or spam can infect your computer in various ways, using up resources or clogging up a network. Note: Packard Bell guarantees that your computer was 100% virus free at the time of purchase and does not cover damages due to viruses.
Spyware is sometimes used by unscrupulous companies to monitor and track the sites you visit on the Internet so as to determine your web-surfing habits and display targeted pop-up ads on your screen. However, some kinds of spyware go beyond simple tracking and actually monitor keystrokes and capture passwords, posing a serious security risk.
How to protect your computer Cybercrime prevention can be straight-forward - when armed with a little technical advice and common sense, many attacks can be avoided. In general, online criminals are trying to make their money as quickly and easily as possible. The more difficult you make their job, the more likely they are to leave you alone and move on to an easier target.
Choose strong passwords and keep them safe Passwords are a fact of life on the Internet today; we use them for everything from ordering flowers and online banking to logging into our favorite airline Web site to see how many miles we have accumulated. The following tips can help make your online experiences secure: •...
goods. Since not divulging any personal information is rarely possible, the following list contains some advice for how to share personal information safely online: • Keep an eye out for phony email messages. Things that indicate a message may be fraudulent are misspellings, poor grammar, odd phrasing, Web site addresses with strange extensions, Web site addresses that are entirely numbers where there are normally words, and anything else out of the ordinary.
sensitive data. Another sign that you have a secure connection is the small lock icon in the bottom of your web browser (usually the right-hand corner). • Pay attention to privacy policies on Web sites and in software. It is important to understand how an organization might collect and use your personal information before you share it with them.
Review bank and credit card statements regularly The impact of identity theft and online crimes can be greatly reduced if you can catch it shortly after your data is stolen or when the first use of your information is attempted. One of the easiest ways to get the tip-off that something has gone wrong is by reviewing the monthly statements provided by your bank and credit card companies for anything out of the ordinary.
correctly, your computer may be infected by malicious software. However, do not blame every computer problem on a virus! If you suspect your computer is infected, the first thing to do is update, if you have not already done so, and run your antivirus and anti-spyware software. 62 - Internet...
Windows tools, or the recovery backup. Note: Packard Bell Recovery Management is only available with a pre-installed Windows operating system. Important: We recommend that you create a Recovery Backup and Drivers and Applications Backup and as soon as possible.
USB drive with a capacity of 32 GB or larger. 1. From Start, type 'Recovery' and then click Packard Bell Recovery Management in the list of apps. 2. Click Create Factory Default Backup. The Recovery Drive window...
opens. Make sure Copy contents from the recovery partition to the recovery drive is selected. This provides the most complete and safest recovery backup. 3. Plug in the USB drive then click Next. 64 - Recovery...
• Since the recovery backup requires at least 16 GB of storage after formatting, it is recommended to use a USB drive with a capacity of 32 GB or larger. 4. You will be shown the backup progress on the screen. 5.
7. Unplug the USB drive and label it clearly. Important: Write a unique, descriptive label on the backup, such as 'Windows Recovery Backup'. Make sure you keep the backup in a safe place that you will remember. REATING A DRIVERS AND APPLICATIONS BACKUP To create a Drivers and Applications Backup, that contains the factory- loaded software and drivers needed by your computer, you may use either 66 - Recovery...
USB storage drive or, if your computer features a DVD recorder, one or more blank recordable DVDs. 1. From Start, type 'Recovery' and then click Packard Bell Recovery Management in the list of apps. 2. Click Create Drivers and Applications Backup.
• If you are using a USB drive, make sure your USB drive has enough capacity before continuing. • If using DVDs, it will also show the number of blank, recordable discs you will need to complete the recovery discs. Make sure that you have the required number of identical, blank discs.
3. Click Start to copy files.You will be shown the backup progress on the screen. 4. Follow the process until it completes: • If you are using optical discs, the drive ejects each disc as it completes burning it. Remove the disc from the drive and mark it with a permanent marker....
solved by returning your system to a previous state when everything was working correctly. For instructions, see "Returning to an earlier system snapshot" on page 73. 3. Reset your operating system. If nothing else has solved the problem and you want to reset your system, but keep your user information, see "Returning your system to its factory condition"...
If you are reinstalling using Windows and the recovery information stored on your computer: • From Start, type 'Recovery' and then click Packard Bell Recovery Management in the list of apps. • Click Reinstall Drivers or Applications. Recovery - 71...
1. Insert the Drivers and Applications Backup into the disc drive or connect it to a free USB port. • If you inserted a DVD wait for Packard Bell Resource Center to start. • If Packard Bell Resource Center does not start automatically, press the Windows key + <E>, then double-click on the optical...
• If you are using a USB drive, press the Windows key + <E>, then double-click on the drive that contains the backup. Double-click on ResourceCenter. 2. You should see the Contents section of the Packard Bell Resource Center. 3. Click the install icon for the item you want to install, then follow the onscreen prompts to complete the installation.
Windows automatically creates an additional restore point each day, and also each time you install software or device drivers. Note: For more information about using Microsoft System Restore, from Start, type 'Help' and then click Help and Support in the list of apps.
"Recovering from a recovery backup" on page 79. Recovering from Windows Start Packard Bell Recovery Management: • From Start, type 'Recovery' and then click Packard Bell Recovery Management in the list of apps. Two options are available, Restore Factory Settings (Reset my PC) or Customized Restore (Refresh my PC).
Store). See "Customized Restore with Packard Bell Recovery Management" on page 78. Restore Factory Settings with Packard Bell Recovery Management 1. Click Restore Factory Settings. Caution: 'Restore Factory Settings' will erase all files on your hard drive. 2. The Reset your PC window opens.
Images for reference only. 3. Click Next, then choose how to erase your files: a. Just remove my files quickly erases all files before restoring your computer and takes about 30 minutes. b. Fully clean the drive completely cleans the drive after each file is erased, so no files can be viewed after the recovery.
Customized Restore with Packard Bell Recovery Management 1. Click Customized Restore (Retain User Data). 2. The Refresh your PC window opens. 3. Click Next, then Refresh. 4. The recovery process begins by restarting your computer, then continues by copying files to your hard drive. This process takes about 30 minutes.
Recovering from a recovery backup To recover from a recovery backup on a USB drive: 1. Find your recovery backup. 2. If your computer does not have a built-in keyboard, make sure a keyboard is attached to your computer. 3. Plug in the USB drive and turn on your computer. 4.
7. Select Troubleshoot and then choose the type of recovery to use: a. Click Advanced then System Restore to start Microsoft System Restore: Microsoft System Restore periodically takes a 'snapshot' of your system settings and saves them as restore points. In most cases of hard-to-resolve software problems, you can return to one of these restore points to get your system running again.
Reset your PC from the recovery backup Caution: Reset your PC will erase all files on your hard drive. 1. The Reset your PC window opens. Images for reference only. 2. Click Next. 3. Select the operating system to recover (normally only one option is available).
drive takes much longer, up to 5 hours, but is much more secure as old files are completely removed. 6. Click Reset. 7. After the recovery has finished, you can start using your computer by repeating the first-start process. Refresh your PC from the recovery backup 1.
REQUENTLY ASKED QUESTIONS The following is a list of possible situations that may arise during the use of your computer. Easy solutions are provided for each one. I turned on the power, but the computer does not start or boot up Look at the power indicator: •...
• The brightness level might be too low. Press (increase) to adjust the brightness level. • The display device might be set to an external monitor. Press toggle the display back to the computer. • If the Sleep indicator is lit, the computer is in Sleep mode. Press and release the power button to resume.
• Make sure that the printer is connected to a power outlet and that it is turned on. • Make sure that the printer cable is connected securely to a USB port and the corresponding port on the printer. Frequently asked questions - 85...
IPS AND HINTS FOR USING INDOWS We know this is a new operating system that will take some getting used to, so we've created a few pointers to help you get started. Three concepts you might want to keep in mind 1.
How do I turn off my computer? Press the Windows key + <C>, click Settings > Power and select the action you'd like to take. Alternatively, from Desktop, click Packard Bell Power Button and select the action you'd like to take.
How do I unlock my computer? Press the any key and click on a user account icon to unlock the computer. If your account has a password set, you will need to enter the password to continue. How do I personalize my computer? You can personalize Start with a different background image or by arranging the tiles to suit your personal needs.
To change the background, press the Windows key + <C> and click Settings > Change PC settings > Personalize. Click Lock screen at the top of the page and select the image and apps you would like to see on the lock screen.
To view the complete list of apps, press the space bar or the Menu key and click All apps. How do I make an app appear on Start? If you're in All apps and you want to make an app appear on Start, you can select the app and right-click on it.
What is a Microsoft ID (account)? A Microsoft account is an email address and password that you use to sign in to Windows. You can use any email address, but it is best if you choose the one you already use to communicate with friends and sign in to your favorite websites.
How do I check for Windows updates? Press the Windows key + <C> and click Settings > Change PC settings > Windows Updates. Click Check for updates now. Where can I get more information? For more information please visit: • Windows 8 tutorials: www.packardbell.com/windows8-tutorial •...
EGULATORY INFORMATION REVENTION OF HEARING LOSS - Caution: Permanent hearing loss may occur if earphones or headphones are used at high volume for prolonged periods of time. - A pleine puissance, l’écoute prolongée du baladeur peut endommager l’oreille de l’utilisateur. CAUTION when listening: To protect your hearing, follow these instructions.
- The following safety precautions should be observed: Do not touch or move antenna while the unit is transmitting or receiving. - Do not hold any component containing the radio such that the antenna is very close or touching any exposed parts of the body, especially the face or eyes, while transmitting.
separation distance of at least 20 cm (8 inches) from all persons or at the minimum distance as specified by the module grant conditions. FCC grants can be viewed from the FCC Equipment Authorization website at https://fjallfoss.fcc.gov/oetcf/eas/ reports/GenericSearch.cfm by entering the FCC ID printed on the module label. - Warning: The wireless adapter is not designed for use with high-gain directional antennas.
- IEEE Std. 802.11n draft 2.0 compliant on Wireless LAN - Wireless Fidelity certification, as defined by the Wi-Fi Alliance The Wireless Adapter and Your Health The wireless adapter, like other radio devices, emits radio frequency electromagnetic energy. The level of energy emitted by the wireless adapter, however, is less than the electromagnetic energy emitted by other wireless devices such as mobile phones.
controls are provided for this wireless adapter allowing any change in the frequency of operations outside the FCC grant of authorization for U.S operation according to Part 15.407 of the FCC rules. USA — Federal Communications Commission (FCC) This device complies with Part 15 of the FCC Rules. Operation of the device is subject to the following two conditions: - This device may not cause harmful interference.
- Increase the distance between the wireless adapter and the equipment experiencing the interference. - Connect the computer with the wireless adapter to an outlet on a circuit different from that to which the equipment experiencing the interference is connected. - Consult the dealer or an experienced radio/TV technician for help.
fréquences dans les bandes 5,25 - 5,35 GHz et 5 65 - 5 85 GHz. Ces stations radar peuvent créer des interférences avec ce produit et/ou lui être nuisible. Le gain d’antenne maximum permissible pour une utilisation avec ce produit est de 6 dBi afin d’être conforme aux limites de puissance isotropique rayonnée équivalente (P.I.R.E.) applicable dans les bandes 5,25 - 5,35 GHz et 5,725 - 5,85 GHz en fonctionement point-à-point.
Belgium Greece Netherlands Iceland Cyprus Hungary Poland Liechtenstein Czech Republic Ireland Portugal Norway Denmark Italy Slovakia Switzerland Estonia Latvia Slovenia Bulgaria Finland Lithuania Spain Romania France Luxembourg Sweden Turkey The low band 5.15 -5.35 GHz is for indoor use only. This equipment complies with the essential requirements of the European Union directive 1999/5/EC.
Hiermit erklärt ACER INC., dass sich das Gerät Radiolan in Deutsch Übereinstimmung mit den grundlegenden Anforderungen und [German] den übrigen einschlägigen Bestimmungen der Richtlinie 1999/5/EG befindet. Käesolevaga kinnitab ACER INC. seadme vastavust direktiivi Eesti [Estonian] 1999/5/EÜ põhinõuetele ja nimetatud direktiivist tulenevatele teistele asjakohastele sätetele.
Con la presente ACER INC. dichiara che questo dispositivo è Itaaliano [Italian] conforme ai requisiti essenziali ed alle altre disposizioni pertinenti stabilite dalla direttiva 1999/5/CE. Ar šo ACER INC. deklarē, ka šī ierīce atbilst Direktīvas Latviski [Latvian] 1999/5/EK būtiskajām prasībām un citiem ar to saistītajiem noteikumiem.
Niniejszym ACER INC. oświadcza, że urządzenie jest zgodne Polski [Polish] z zasadniczymi wymogami oraz pozostałymi stosownymi postanowieniami Dyrektywy 1999/5/EC. ACER INC. declara que este dispostivo está conforme com Português os requisitos essenciais e outras disposições da Directiva [Portuguese] 1999/5/CE. ACER INC. izjavlja, da je ta naprava skladna z bistvenimi Slovensko zahtevami in ostalimi relevantnimi določili Direktive ...
Belgium Dans le cas d'une utilisation privée, à l'extérieur d'un bâtiment, au-dessus d'un espace public, aucun enregistrement n'est nécessaire pour une distance de moins de 300 m. Pour une distance supérieure à 300 m un enregistrement auprès de l'IBPT est requise. Pour les enregistrements et licences, veuillez contacter l'IBPT.
低功率射頻電機須忍受合法通信或工業、科學及醫療用電波輻射性電機設備之干擾。 ODIFICATIONS TO THE RODUCT CE Marking Packard Bell cannot be held responsible for unauthorized modifications made by the user and the consequences thereof, which may alter the conformity of the product with the CE Marking. Radio frequency interference The manufacturer is not responsible for any radio or TV interference caused by unauthorised modifications to this equipment.
Building supply Only connect the equipment to a building supply that is in accordance with current wiring regulations in your country. In the U.K., these are the IEE regulations. OWER SUPPLY AND CABLES Power supply The power supply socket-inlet and socket-outlet (if equipped) are classified as Hazardous Voltage.
Only Ethernet LAN or RTC modem cable can have length exceeding 3 metres. Packard Bell recommends that you add a ferrite core round clip to each cable connecting your computer to a hardware device that was not included with your computer.
ASER OMPLIANCE TATEMENT The optical devices are tested and certified to be compliant with International Electrotechnical Commission IEC60825-1 and European EN60825-1 standards for Class 1 laser products. Class 1 laser products are not considered hazardous. The optical devices are designed such that there is never human access to laser radiation above a Class 1 level during normal operation or prescribed maintenance conditions.
UR COMMITMENT TO ENVIRONMENTAL PROTECTION Environment has been at the heart of our products. Packard Bell is committed to limit the environmental impact of its products during product life cycle. Starting at design phase, with a very strict procurement policy, maximum attention is given to electronic components in order to limit their weight in heavy metals such as lead, cadmium, chromium, mercury, etc.
Products that are ENERGY STAR qualified use less energy and prevent greenhouse gas emissions by meeting strict energy efficiency guidelines set by the U.S. Environmental Protection Agency. Packard Bell is committed to offering products and services worldwide that help customers save money, conserve energy and improve the quality of our environment.
- wake from "Sleep" mode if the keyboard is pressed or mouse is moved. - save more than 80% energy when in "Sleep" mode. ENERGY STAR and the ENERGY STAR mark are registered U.S. marks. 112 - Environment...
OFTWARE LICENSE - Note: Most of the software applications are already preinstalled on your Packard Bell computer. They are ready to use or to set up. However, some titles require a CD or DVD to run. You will find these discs in your computer's packaging.
2. Copyright The SOFTWARE is owned by Packard Bell or its suppliers and is protected by United States copyright laws and international treaty provision. Therefore, you must treat the SOFTWARE like any other copyrighted material (e.g. a book or musical recording) except that you may transfer the CD and/or DVD disc portion of the SOFTWARE, if any, to a single hard disk provided you keep the original solely for backup or archival purposes.
shall always apply. You may access www.gnu.org directly to obtain a copy of the GPL or write to the free Software Foundation, Inc. and request a copy. The address of the Free Software Foundation, Inc is: 59 Temple Place - Suite 330, Boston, MA, 02111-1307, USA. For a period of three (3) years as commencing from your receipt of this software, you may obtain a complete machine-readable copy of the source code for the Free Software under the terms of the GPL without charge except for the cost of media, shipping, and handling,...
......32 Uninstalling hardware Update ......33 ..61 universal serial bus Windows automatic updates ..........19 view left ..........19 ..........20 front right ..........7 Warranty Windows ..........49, 50 ......46 WiFi Using Windows ..61 Windows automatic updates ........