Advertisement

User Guide
Gateway ID47H
- 1

Advertisement

Table of Contents
loading

Summary of Contents for Gateway ID47H

  • Page 1 User Guide Gateway ID47H...
  • Page 2: Table Of Contents

    Internet security offer ....... 35 Recovery ............6 Productivity software ........ 36 Having trouble? ..........6 Gateway Recovery Management..... 36 Gateway My Backup ........ 36 Computer Basics Playing multimedia files......40 Safety and comfort ..........8 AutoPlay........... 42 Safety precautions ........8 Playing downloaded files......
  • Page 3: Table Of Contents

    Gateway ID47H User Guide All Rights Reserved. Original Issue: 28 April 2011 Visit registration.gateway.com and discover the benefits of being a customer of Gateway. Remark: All images are for reference purposes only. Actual configuration may vary. Table of contents - 3...
  • Page 4: Starting Your Computer

    T A R T I N G Y O U R C O M P U T E R Thank you for purchasing this Gateway computer! This guide has been designed to introduce you to the features of your computer and assist in your computing experience.
  • Page 5: Registration

    Another option Another way to register your Gateway product is to visit our website at registration.gateway.com. Choose your country and follow the simple instructions.
  • Page 6: Software Installation

    ECOVERY You should create recovery discs as soon as you are able. The Gateway Recovery Management program allow you to create recovery discs and then to restore or reinstall applications and drivers provided by Gateway.
  • Page 7 Warranty and contact information You can find information about the warranty for your computer and how to contact technical support in your computer’s Warranty. Starting your computer - 7...
  • Page 8: Computer Basics

    O M P U T E R A S I C S AFETY AND COMFORT Safety precautions Please follow the guidelines below to use your computer comfortably and to avoid health problems. Computer environment Make sure that the computer: • Is used on a stable surface, stand or table. A fall can seriously damage the computer.
  • Page 9 Cables Make sure that: • Cables are not strained and that there is no risk of people walking or tripping over them. • Other devices do not crush the cables. • The power cable is connected to the computer before connecting the power cable to the AC power outlet.
  • Page 10 • If you spill liquid on your computer, switch it off immediately, unplug the AC adapter, remove the battery and make sure it is completely dry before switching it on again. Wait overnight if necessary. Note: If your computer includes slots for memory cards or expansion devices, plastic ’dummies’...
  • Page 11: Health Precautions

    damage and will often require extensive work by a qualified technician to restore the product to normal condition. Health precautions • The computer and accessories may contain small parts. Keep them out of the reach of small children. • If you work or play for hours at a time, then make sure you take regular breaks.
  • Page 12 • The computer’s underside, power adapter and the air from ventilation slots may become hot during use. Avoid continuous body contact and do not place the computer on your lap while it is operating. • Ensure that the computer’s ventilation slots and openings are never obstructed or covered.
  • Page 13: Getting To Know Your Computer

    E T T I N G T O K N O W Y O U R C O M P U T E R After setting up your computer, as illustrated in the setup instructions, let us show you around your new Gateway computer. Getting to know your computer - 13...
  • Page 14: Top View - Display

    OP VIEW DISPLAY Icon Item Description Webcam Web camera for video communication. Also called Liquid-Crystal Display (LCD), Display screen displays computer output. Microphone Internal microphone for sound recording.
  • Page 15: Top View - Keyboard

    OP VIEW KEYBOARD Icon Item Description Power button / Turns the computer on and off. Indicates the indicator computer's power status. For entering data into your computer. Keyboard - Special keys are described on page 17. Touch-sensitive pointing device. - The touchpad and selection buttons form a Touchpad single surface;...
  • Page 16: Touchpad

    Icon Item Description The lower left and right of the touchpad react Selection buttons like the left and right selection buttons; press (left and right) down firmly on either area to perform a left or right click. Touchpad The touchpad controls the arrow on the screen; called the pointer or the cursor.
  • Page 17: Special Keys

    E.g. press the Fn key to activate the F1 to F12 keys. Help Opens the Help menu. Allows you to create backup copies of your computer; Gateway either the entire system or only selected files and MyBackup folders. Create a regular schedule or make copies whenever you want.
  • Page 18 Icon Function Description The Touchpad Lock button toggles the touchpad on or off to avoid unwanted pointer movements when using Touchpad Lock the keyboard. This is most useful if you have connected a mouse to your computer. Play/Pause Play or pause a selected media file. Stop Stop playing the selected media file.
  • Page 19 Hotkeys The computer uses hotkeys (key combinations) to access function keys and navigation commands. To activate hotkeys, press and hold the Fn key (bottom left) before pressing the other key in the hotkey combination. Hotkey Function Description Fn + Special keys Function keys Activates the F1 to F12 keys.
  • Page 20: Front View

    RONT VIEW Icon Item Description Power indicator Indicates the computer's power status. HDD indicator Indicates when the hard disk drive is active. Communication Indicates the computer’s wireless connectivity indicator device status. Indicates the computer's battery status. - Charging: The light shows amber when the Battery indicator battery is charging.
  • Page 21: Left View

    EFT VIEW Icon Item Description DC-in jack Connects to your computer’s AC adapter. Allows the computer to stay cool. Ventilation and cooling fan - Do not cover or obstruct the openings. External display Connects to a display device (e.g., external (VGA) port monitor, LCD projector).
  • Page 22: Right View

    IGHT VIEW 3 4 5 Icon Item Description Connects to USB devices. USB 3.0 port - A USB 3.0 port can be distinguished by its blue connector. Information on USB 3.0 - Supports power-off USB charging, allowing you to charge supported mobile devices while the notebook is switched off.
  • Page 23 Icon Item Description Connects to an Ethernet 10/100/1000-based Ethernet (RJ-45) port network. Connects to a Kensington-compatible Kensington lock slot computer security lock. - Wrap the computer security lock cable around an immovable object such as a table or handle of a locked drawer. Insert the lock into the notch and turn the key to secure the lock.
  • Page 24: Base View

    ASE VIEW Icon Item Description Allows the computer to stay cool. Ventilation and cooling fan - Do not cover or obstruct the openings. Insert a paperclip into the hole to reset the computer (simulates removing and reinstalling the battery). Battery reset pinhole - Your computer’s battery is embedded and not removable.
  • Page 25: Upgrading Your Computer

    P G R A D I N G Y O U R C O M P U T E R XPANDING THROUGH OPTIONS Your computer offers you many options for a complete computing experience. Connectivity options Ports allow you to connect peripheral devices to your computer. For instructions on how to connect different external devices to the computer, read the following section.
  • Page 26 to use a program to access the contents of the card. Select an option here if it is appropriate, otherwise select Cancel. If the card contains no files, or unknown files, a window will open showing the contents of the card.
  • Page 27 Built-in networking The built-in networking allows you to connect your computer to an Ethernet-based network. Connect an Ethernet cable from the Ethernet (RJ-45) port on the chassis of the computer to a network jack or hub on your network. Universal Serial Bus (USB) The USB port is a high-speed serial bus which allows you to connect USB peripherals without taking up system resources.
  • Page 28 Certain computers may include one or more USB 3.0 ports. These resemble standard USB ports, except they include additional internal connections and are blue. You may use USB 3.0 compatible devices with these ports to benefit from faster transfer speeds. Video port Connect to a monitor with a VGA or DVI port (the type of connection supported depends on your computer’s configuration).
  • Page 29 High-Definition Multimedia Interface (only for certain models) HDMI (High-Definition Multimedia Interface) is an industry- supported, uncompressed, all-digital audio/video interface. HDMI provides an interface between any compatible digital audio/video source, such as a set-top box, DVD player, and A/V receiver and a compatible digital audio and/or video monitor, such as a digital television (DTV), over a single cable.
  • Page 30: Power Supply

    O W E R S U P P L Y POWER ADAPTER Your computer can use the supplied external power adapter (a power 'brick') to run on AC power. A power cable is provided that is appropriate for the country where the computer was purchased. The power adapter provides adequate power to run your computer and recharge the battery pack at the same time.
  • Page 31: Battery Pack

    ATTERY PACK The computer uses a battery pack that gives you extended use between charges. Note: Certain computers provide long-life batteries that continue to hold a useful charge for over 1000 cycles (about three years). Normal batteries start to lose charge after one-two years. Battery pack characteristics The battery pack has the following characteristics: •...
  • Page 32: Charging The Battery

    Charging the battery Plug the AC adapter into the computer, and connect to a mains power outlet. You can continue to operate your computer on AC power while your battery is charging. However, charging the battery with the computer turned off results in a significantly faster charge time. Note: You are advised to charge the battery before retiring for the day.
  • Page 33 Long-life batteries (optional) Certain computers provide long-life batteries that continue to hold a useful charge over 1000 recharge cycles (about three years). Standard batteries start to lose charge after one or two years. Replacing the battery Your computer uses an embedded Lithium-ion battery. If the battery needs to be replaced, please contact an authorized service center.
  • Page 34: Low Battery Warning

    Low battery warning When using battery power pay attention to the Windows power meter. Warning: Connect the AC adapter as soon as possible after the battery-low warning appears. Data will be lost if the battery to become fully depleted and the computer shuts down. When the battery-low warning appears, the recommended course of action depends on your situation: Situation...
  • Page 35: Software

    O F T W A R E SING INDOWS AND YOUR SOFTWARE Gateway computers include software to help you use your computer; the programs and categories available on your computer depend on the model purchased. Most of this software is ’pre-installed’ and ready to be used;...
  • Page 36: Productivity Software

    See page 84 for more information. Gateway My Backup Gateway MyBackup provides a simple process that allows you to create backup copies of your entire system, or selected files and folders. Backups may be created according to a schedule or manually, whenever needed.
  • Page 37 Opening MyBackup Press the Gateway MyBackup key to start the program. Otherwise click on Start > All programs > Gateway MyBackup > Gateway MyBackup Choose how to manage your data Three options are available: Back Up My Files, Image My Drive, and Migrate My Files.
  • Page 38 Select an option and follow the instructions displayed on screen. Setup Schedule Gateway MyBackup allows you to schedule automatic backup routines or run the backup manually. You can schedule Daily, Weekly and Monthly routines by selecting one of the tabs on the left.
  • Page 39 Finding your files after a backup Simply browse to the location of the backup files (if required, connect the removable device or insert the optical disc) to check or restore your safe files. Restoring files from your backup If you lose one or more files, or wish to transfer copies of your files to a different computer (for extra security, or a new purchase), you may do so by browsing to the location of your stored files (select where you would like to store the files) and copying them normally.
  • Page 40: Playing Multimedia Files

    One or more media programs are installed on your computer, Windows Media Player and optionally Windows Media Center are provided by Microsoft. Other media programs may have been installed by Gateway to provide an improved media experience. Windows Media Player Windows Media Player may be used to play MP3 or WMA audio files, CDs or most video files.
  • Page 41 Windows Media Center (optional) Certain computers include all-in- one media ‘centers’ such as Windows Media Center. These programs can handle a variety of multimedia content, presented with simple menus that may be easily controlled with a remote control. You may watch live or recorded TV (if your computer has a TV tuner), listen to digital music, view pictures and personal videos, create CDs and DVDs, or...
  • Page 42: Autoplay

    shows channel and network information, as well as the title, description and scheduled broadcast time of shows. Cyberlink PowerDVD (optional) If your computer does not include Windows Media Center, or it is equipped with a Blu-ray drive, you may watch movies with PowerDVD. You may start PowerDVD by inserting a disc and waiting for the program to start automatically.
  • Page 43: Playing Downloaded Files

    Playing downloaded files Downloaded files may work with the media programs installed on your computer, or may require specific programs. Files that include DRM functions may only play in specific programs (e.g. iTunes, Windows Media Player) or only on devices certified for use with the each type of file. Other formats may require a specific audio or video codec that may not have been installed on your computer.
  • Page 44: Playing Dvd Movies

    Playing DVD movies You can play DVD movies on your computer. 1. Insert the DVD. Important! When you launch the DVD player for the first time, the program asks you to enter the region code. DVD content is coded with one of six regions.
  • Page 45: Playing Blu-Ray Movies

    Playing Blu-ray movies If your computer is equiped with a Blu-ray disc drive, you can play Blu-ray movies on your computer. Simply insert the disc into the optical drive, after a short delay Cyberlink PowerDVD will start to play the movie. Use the media controls to control playback.
  • Page 46 Log in... or Sign up The top of the application shows your profile picture and account information from Facebook. If you have not yet created or accessed your Facebook profile, the top image is the anonymous white-on-blue placeholder, and no information is shown. When you first start the Social Networks application, you will be asked to Log in to your social networks.
  • Page 47 If you choose Sign up to Facebook please fill in the requested information, with your email and an appropriate password. You will then continue to authorize access for your account. Please allow access for all steps, this will ensure all Social Networks features work normally.
  • Page 48 Accessing your social networks Once you have authorized access, your profile picture and status information will be displayed. You may update this information with a click. Quick actions Click on a link to see more in a new window. I.e. click on a Facebook entry to open your Facebook account and view the entire entry;...
  • Page 49 Click on the arrow in the top bar to hide the full application and display a small alert bar on the top of your screen. Click the alert bar (below) to see the full window with a summary of your friends' activities. Note: Do not use the X icon to exit Social Networks, unless you want to stop sending or receiving updates.
  • Page 50 Changing settings Click the settings icon to access settings for the social networks. Live Update - If the Live Update button is active, you may download and install an updated version of the Social Networks application. Click the tab for a network to see specific settings; you may set how often a network is checked (the refresh frequency) and logout from specific networks in this section.
  • Page 51: Dolby Home Theater (Optional)

    Dolby Home Theater (optional) Your computer may provide additional sound options with Dolby Home Theater. Click on the Dolby Home Theater icon in the notification area. In the pop-up window, you can choose from preset sound profiles: Music, Movie or Game. Click the power button in the top-left corner to turn off Dolby Home Theater sound effects, or click the settings button to open advanced settings.
  • Page 52: Internet

    N T E R N E T IRST STEPS ON THE NET Protecting your computer It is vital to protect your computer from viruses and attacks over the Internet (see Internet security offer on page 35 and Security on page 60). A comprehensive Internet security program is offered when you first start your computer.
  • Page 53 Connection types Depending on your computer model, your location and your communication needs, you have several ways to connect to the Internet. Dial-up Some computers include a telephone dial-up (‘modem’) connector. This allows you to connect to the Internet using your telephone line. With a dial- up connection, you cannot use the modem and the telephone simultaneously on a single phone line.
  • Page 54: Network Connections

    Cable A cable connection provides fast and always-on Internet service via a cable television line. This service is generally available in large cities. You can use your telephone and watch cable TV at the same time you are connected to the Internet. 3G (WWAN or 'Wireless Wide-Area Network') A 3G connection allows you to use cellular networks (such as those used by a mobile phone) to connect to the Internet while away from home.
  • Page 55 Wireless networks A wireless LAN or WLAN is a wireless local area network, which may link two or more computers without using wires. Setting up a wireless network is easy and allows you to share files, peripheral devices and an Internet connection.
  • Page 56 router with the subscription to their services. Read carefully the documentation supplied with your Access point/router for detailed setup instructions. Network cable (RJ45) A network cable (also called RJ45 cable) is used to connect the host computer to the access point (see illustration below); this type of cable may also be used to connect peripheral devices to the access point.
  • Page 57 Diagram of a working network 1. Access point/router 2. Desktop computer 3. Modem 4. Printer 5. Portable computer 6. PDA/Smartphone 7. Network cables (RJ45) Turning on/off a wireless network connection Most computers feature a ‘WiFi’ button that turns the network connection on or off.
  • Page 58: Surf The Net

    they may be dangerous to the operation of the aircraft, disrupt communications, and even be illegal. Surf the Net! To surf the Internet, you need a program called an Internet browser. Internet Explorer provides an easy and secure web browsing experience. As soon as you have your Internet access installed and you are connected, click on the Internet Explorer shortcut located on the Windows desktop and take your Internet experience to a...
  • Page 59 2. Back and Forward buttons: Navigate through pages you have already visited. 3. Address bar: Type in an Internet address (e.g. www.gateway.com) and press the Enter key on your keyboard, this will take you directly to the address you typed.
  • Page 60: Security

    Gateway is dedicated to provide you with on-going personalized support. Check out our Support section to get help tailored to your needs. www.gateway.com is your portal to a world of online activities and services: visit us regularly for the latest information and downloads!
  • Page 61 Security You are probably eager to explore everything the Internet has to offer. In order for you to be safe online, Gateway has pre-installed Symantec’s award-winning Norton Internet Security™ on your computer. Norton Internet Security runs quietly in the background to block today’s complex threats and protect your identity when you shop, bank, or browse online.
  • Page 62 activity, collect personal information, cause pop-up ads to appear, or even change the configuration of your computer. Spyware consumes resources on your computer; it can slow down your Internet connection or entire computer system, and even cause crashes. Spyware is sometimes used by unscrupulous companies to monitor and track the sites you visit on the Internet so as to determine your web-surfing habits and display targeted pop-up ads on your screen.
  • Page 63 game connecting to a multi-player server or an encyclopaedia making a content update). How to protect your computer Cybercrime prevention can be straight-forward - when armed with a little technical advice and common sense, many attacks can be avoided. In general, online criminals are trying to make their money as quickly and easily as possible.
  • Page 64 A complete version of Norton Internet Security™ is pre-installed on your Gateway system. It includes a free trial subscription to protection updates. Make sure you Activate it!
  • Page 65 Choose strong passwords and keep them safe Passwords are a fact of life on the Internet today; we use them for everything from ordering flowers and online banking to logging into our favorite airline Web site to see how many miles we have accumulated. The following tips can help make your online experiences secure: •...
  • Page 66 goods. Since not divulging any personal information is rarely possible, the following list contains some advice for how to share personal information safely online: • Keep an eye out for phony email messages. Things that indicate a message may be fraudulent are misspellings, poor grammar, odd phrasing, Web site addresses with strange extensions, Web site addresses that are entirely numbers where there are normally words, and anything else out of the ordinary.
  • Page 67 sensitive data. Another sign that you have a secure connection is the small lock icon in the bottom of your web browser (usually the right-hand corner). • Pay attention to privacy policies on Web sites and in software. It is important to understand how an organization might collect and use your personal information before you share it with them.
  • Page 68 Review bank and credit card statements regularly The impact of identity theft and online crimes can be greatly reduced if you can catch it shortly after your data is stolen or when the first use of your information is attempted. One of the easiest ways to get the tip-off that something has gone wrong is by reviewing the monthly statements provided by your bank and credit card companies for anything out of the ordinary.
  • Page 69 Alternatively, if a security alert been reported Notification Area, next to the clock) then you can click on the notification balloon or double-click on the small Security Alert icon. The Action Center indicates the status and settings used for important applications that protect your computer.
  • Page 70 Certain programs need access to the Internet to function properly, or even to function at all. If this is the case, you will usually be asked to allow access when you install a program, or the first time you check firewall settings, click on Start >...
  • Page 71 updates include security patches and program updates that can improve your computing experience and help protect your computer against new viruses and attacks. Windows Defender Windows Defender helps protect your computer against malicious and unwanted software, such as spyware and adware. Windows Defender is installed and turned on by default.
  • Page 72 User Account Control The User Accounts control panel can help prevent unauthorized changes to your computer. User Accounts will ask you for permission or an administrator password before performing actions that could potentially affect your computer's operation or that change settings that affect other users.
  • Page 73 Internet Explorer security settings Internet sites use small files called cookies to keep track of user preferences and information. You can adjust your Internet browser's security settings to determine how much -or how little- information you are willing to accept from a Web site. To access Internet Explorer security settings: 1.
  • Page 74: Helpdesk

    • physical errors, which may occur on your hard disk as it wears out over time. 1. Click on Start > Computer. Right-click on the Gateway (C:) icon and select Properties. 2. Click on Tools and Check Now in the Error-checking section.
  • Page 75 Bin and other temporary files that you may safely delete. 1. Click on Start > Computer. Right-click on the Gateway icon and select Properties. 2. Select the General tab and click on the Disk Cleanup button (next to the diagram of the disk drive.
  • Page 76 1. Perform a Disk Cleanup and close all open programs. 2. Click on Start > Computer. Right-click on the Gateway icon and select Properties. 3. Click on Tools and Defragment now..4. Click on the volume you want to...
  • Page 77 Check the remaining free space on your hard disk drive 1. Click on Start > Computer. 2. Right-click on the Gateway icon and select Properties. 3. The Hard Disk Properties window displays the amount of used space and free space on your hard disk.
  • Page 78 2. Uninstall the programs you no longer use: Click on Start > Control Panel > Programs > Programs and Features. 3. Archive files on an external hard disk drive, recordable CDs or DVDs (if your computer is equipped with a CD or DVD writer) and delete them from the hard disk.
  • Page 79 Windows System Restore. System Restore monitors changes to your computer and automatically creates restore points that store your computer’s configuration each time a major change occurs (such as installing programs). It can undo harmful changes to your computer and restore settings and performance without removing your personal data files (such as documents, browsing history, photos, favorites, or emails).
  • Page 80 If you cannot access the Windows desktop: 1. Press the Alt+F10 key upon start-up when the Gateway logo appears. This will open the Recovery Program. 2. Select Windows System Restore and click Next. Your computer will automatically restart and open System Restore.
  • Page 81: Updates

    Create a Restore Point Windows creates restore points automatically at regularly scheduled times or before certain programs or drivers are installed. This option allows you to create your own restore points when you need to. 1. Click Start > Control Panel > System and Security > System. Click on System protection in the sidebar and then click the Create...
  • Page 82 • Perform updates when prompted by Windows Action Center. • Use Microsoft Windows Automatic Updates. • Run Windows Update. Internet security Norton Internet Security, combined with other security applications can protect your computer from Internet attacks and ensure that the latest security updates have been downloaded and installed on your computer.
  • Page 83: Windows Remote Assistance

    Windows Remote Assistance Remote Assistance allows a Windows user to temporarily take over a remote Windows computer over a network or the internet to resolve issues. Remote Assistance makes it possible to diagnose and repair problems with a computer without personally visiting it. You can access Remote Assistance by clicking on Start >...
  • Page 84: Recovery

    E C O V E R Y ATEWAY ECOVERY ANAGEMENT Note: Gateway Recovery Management is only available with a preinstalled Windows operating system. If your computer experiences problems that are not recoverable by other methods, you may need to reinstall the Windows operating system and factory-loaded software and drivers.
  • Page 85 2. To create recovery discs for the hard drive’s entire original contents, including Windows and all factory-loaded software and drivers, click Create Factory Default Disc. - OR - To create recovery discs for only the factory-loaded software and drivers, click Create Drivers and Applications Backup Disc. Important: We recommend that you create each type of recovery disc as soon as possible.
  • Page 86 The Create Factory Default Backup dialog box opens. This dialog box tells you the number of blank, recordable discs you will need to complete the recovery discs. Make sure that you have the required number of identical, blank discs ready before continuing.
  • Page 87: Recovering Your System

    5. If multiple discs are required, insert a new disc when prompted, then click OK. Continue until the process is complete. ECOVERING YOUR SYSTEM If Gateway support did not help fix your problem, you can use the Gateway Recovery Management program. This will restore your computer Recovery - 87...
  • Page 88 to the same state as when you purchased it, while giving you an option to retain all settings and personal data for later retrieval. To recover your system: 1. Perform minor fixes. If only one or two items of software or hardware have stopped working correctly, the problem may be solved by reinstalling the software or the device drivers.
  • Page 89: Types Of Recovery

    - OR - If you are recovering from your driver and application recovery backup, insert it into the disc drive, then go to Step 3 after the Gateway Application Recovery main menu opens. 2. Click on the Restore tab, then click Reinstall Drivers or Applications.
  • Page 90 3. Click on Contents. A list of software and device drivers opens. 4. Click on the install icon for the item you want to install, then follow the on-screen prompts to complete the installation. Repeat this step for each item you want to reinstall. Returning to a previous system condition Microsoft System Restore periodically takes ’snapshots’...
  • Page 91 Help: For more information about using Microsoft System Restore, click Start, then click Help and Support. Type windows system restore in the Search Help box, then press Enter. To return to a restore point: 1. Click on Start > Control Panel > System and Security > Action Center, then click on Recovery.
  • Page 92 4. Click on OK. The recovery process begins by restarting your computer, then continues by copying files to your hard drive. This process may take a while, but a Gateway Recovery Management screen shows you its progress. When the recovery has finished, a dialog box prompts you to restart your computer.
  • Page 93 Recovering from the hard drive during startup To reinstall Windows and all pre-installed software and drivers: 1. Turn on your computer, then press Alt+F10 during startup. Gateway Recovery Management opens. 2. Click on Restore system from factory default. Caution: Continuing the process will erase all files on your hard drive.
  • Page 94 6. Your computer will restart. 3. During startup, press F12 to open the boot menu. The boot menu allows you to select which device to start from, such as the hard drive or an optical disc. 4. Use your arrow keys to select the line CDROM/DVD (this line may start with ’IDE 1...’), then press Enter.
  • Page 95: Regulatory Information

    Caution: Wireless devices are not user-serviceable. Do not modify them in any way. Modification to a wireless device will void the authorization to use it. Contact Gateway for service information. Caution: The transmitting device embedded in this computer may not be used with any antenna other than the one provided with the computer.
  • Page 96 Warning: Using wireless devices while flying in aircraft is prohibited. Switch off all devices before boarding an aircraft; they may be dangerous to the operation of the aircraft, disrupt communications, and even be illegal. (FCC) I FCC P EDERAL OMMUNICATIONS OMMISSION NTENTIONAL EMITTER PER Low power, Radio transmitter type devices (radio frequency (RF) wireless communication...
  • Page 97 ADIO DEVICE REGULATORY NOTICE Note: Regulatory information below is for models with wireless LAN and/or Bluetooth only. General This product complies with the radio frequency and safety standards of any country or region in which it has been approved for wireless use. Depending on configuration, this product may or may not contain wireless radio devices (such as wireless LAN and/or Bluetooth modules).
  • Page 98: List Of National Codes

    Departments in which the use of the 2400 - 2483.5 MHz band is permitted with an EIRP of less than 100 mW indoors and less than 10 mW outdoors: 01 Ain Orientales 25 Doubs 59 Nord 75 Paris 02 Aisne 26 Drome 60 Oise 82 Tarn et Garonne...
  • Page 99 This product contains chemicals known to the State of California to cause cancer, birth defects, and/or other reproductive harm. For additional information regarding this product warning, go to www.gateway.com/prop65. ERCURY WARNING THE LAMP IN THIS DISPLAY CONTAINS MERCURY. DISPOSE ACCORDING TO LOCAL, STATE, AND FEDERAL LAW.
  • Page 100 The telephone company may make changes in its facilities, equipment, operations, or procedures that could affect the operation of this equipment. If this happens, the telephone company will provide advance notice in order for you to make necessary modifications to maintain uninterrupted service. This equipment cannot be used on telephone company-provided coin service.
  • Page 101 Operation of this device is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation of the device. ICES-003 NINTENTIONAL EMITTER PER This digital apparatus does not exceed the Class B limits for radio noise emissions from digital apparatus as set out in the radio interference regulations of Industry Canada.
  • Page 102 Users should make sure, for their own protection, that the electrical ground connections of the power utility, telephone lines, and internal metallic water pipe system, if present, are connected together. This precaution may be particularly important in rural areas. The Ringer Equivalence Number (REN) assigned to each terminal device provides an indication of the maximum number of terminals allowed to be connected to a telephone interface.
  • Page 103 ODIFICATIONS TO THE RODUCT CE Marking Gateway cannot be held responsible for unauthorized modifications made by the user and the consequences thereof, which may alter the conformity of the product with the CE Marking. Radio frequency interference The manufacturer is not responsible for any radio or TV interference caused by unauthorised modifications to this equipment.
  • Page 104 ONNECTIONS AND REMOTE EARTHS PELV (Protected Extra Low Voltage) To ensure the extra-low voltage integrity of the equipment, only connect equipment with mains-protected electrically-compatible circuits to the external ports. SELV (Safety Extra Low Voltage) Every input and output of this product is classified as Safety Extra Low Voltage. Remote earths To prevent electrical shock, connect all local (individual office) computers and computer support equipment to the same electrical circuit of the building wiring.
  • Page 105 Only Ethernet LAN or RTC modem cable can have length exceeding 3 metres. Gateway recommends that you add a ferrite core round clip to each cable connecting your computer to a hardware device that was not included with your computer.
  • Page 106 - Stereo Jack shielded Audio cables from Hama 43330H, 42714H Heat Build-up and Portable Computers The AC adapter and the underside of the computer can become hot after prolonged use. Sustained physical contact with either should be avoided. HASSIS COVER REMOVAL AND REPLACEMENT Before removing the chassis cover to service or modify the equipment, you must disconnect all power and modem cords, and remove or disable the battery.
  • Page 107 OMPLIANT WITH USSIAN REGULATORY CERTIFICATION Regulatory information - 107...
  • Page 108: Environment

    UR COMMITMENT TO ENVIRONMENTAL PROTECTION Environment has been at the heart of our products. Gateway is committed to limit the environmental impact of its products during product life cycle. Starting at design phase, with a very strict procurement policy, maximum attention is given to electronic components in order to limit their weight in heavy metals such as lead, cadmium, chromium, mercury, etc.
  • Page 109 Battery disposal (when applicable) Before disposing of your equipment ensure that you have removed any batteries that may be fitted in the equipment. European law states that batteries must be collected for disposal separately from household waste. Do not throw your used batteries in the dustbin.
  • Page 110: Software License

    The following License Agreement applies to you. This is a legal agreement between you (either individual or an entity) and Gateway By installing the software you are agreeing to be bound by the terms of this Agreement. If you do not agree to the terms of this...
  • Page 111: Software License

    2. Copyright The SOFTWARE is owned by Gateway or its suppliers and is protected by United States copyright laws and international treaty provision. Therefore, you must treat the SOFTWARE like any other copyrighted material (e.g. a book or musical recording) except that you may transfer the CD and/or DVD disc portion of the SOFTWARE, if any, to a single hard disk provided you keep the original solely for backup or archival purposes.
  • Page 112 GPL or write to the free Software Foundation, Inc. and request a copy. The address of the Free Software Foundation, Inc is: 59 Temple Place - Suite 330, Boston, MA, 02111-1307, USA. For a period of three (3) years as commencing from your receipt of this software, you may obtain a complete machine-readable copy of the source code for the Free Software under the terms of the GPL without charge except for the cost of media, shipping, and handling, upon a written request to us.
  • Page 113: Index

    N D E X ........... 40 ..........42 Audio CDs Autoplay ..........109 ........ 34 Batteries low conditions ........109 ........32 battery disposal optimizing ........32 battery pack removing ......34 ........... 42, 45 battery-low warning Blu-ray ........ 31 characteristics brightness .........
  • Page 114 Electronic Program Guide Epilepsy warning ........108 ........74 Environment Error checking .......... 62, 69 ..........20 Firewall front view Gateway ..36 Recovery Management Program ....... 11 HDD (Hard Disk Drive) Health precautions ........75 ..........74 Free space Helpdesk ........
  • Page 115 ..........62 Maintenance Malware ......77 ......25 HDD management Memory card reader ..36 ..........53 Recovery Management Program Modem ........78 ........40 System tools Multimedia files ..........27 ....61, 64 network Norton Internet Security ......54 Network connections ..........
  • Page 116 ..........40 TV tuner ......26 Uninstalling hardware Update ....... 27 ..70, 82 universal serial bus Windows automatic updates ......72 User Account Control ..........21 view left ..........21 ..........22 front right ..........7 .... 68, 81 Warranty Windows Action Center ........

Table of Contents