Advertisement

Quick Links

User's guide
Gateway LT Series
-
1

Advertisement

Table of Contents
loading

Summary of Contents for Acer LU.WXA0D.003

  • Page 1 User’s guide Gateway LT Series...
  • Page 2: Table Of Contents

    A B L E O F C O N T E N T S Starting your computer Wireless connection... 4 Registration... 5 Software installation ... 6 Recovery ... 6 Having trouble? ... 6 Computer Basics Safety and comfort ... 8 Safety precautions ...
  • Page 3: Table Of Contents

    Regulatory information Environment Software license Index Copyright © 2011. All Rights Reserved. Visit registration.gateway.com and discover the benefits of being a customer of Gateway. Remark: All images are for reference purposes only. Actual configuration may vary. Gateway LT Series User Guide Original Issue: 23 February 2011 Table of contents -...
  • Page 4: Starting Your Computer

    T A R T I N G YOUR C O M P U T E R Thank you for purchasing this Gateway computer! This guide has been designed to introduce you to the features of your computer and assist in your computing experience. After setting up and starting your computer, as shown in the setup instructions, it will ask you questions that will help you connect to the Internet.
  • Page 5: Registration

    Alternatively, use a network cable to connect directly to a network port on your router. Please refer to your ISP or router’s guide. EGISTRATION When using your computer for the first time, it is recommended that you register it. This gives you access to some useful benefits, such as: •...
  • Page 6: Software Installation

    OFTWARE INSTALLATION Your computer will automatically install software and prepare your computer for use. This may take some time, please do not turn off your computer; wait until the installation has finished. ECOVERY You should create recovery discs as soon as you are able. The Gateway Recovery Management program allow you to create recovery discs and then to restore or reinstall applications and drivers provided by Gateway.
  • Page 7 Gateway website Remember to visit www.gateway.com - Check out the support section for up-to-date information, help, drivers and downloads. Warranty and contact information You can find information about the warranty for your computer and how to contact technical support in your computer’s Warranty. Starting your computer -...
  • Page 8: Computer Basics

    AFETY AND COMFORT Safety precautions Please follow the guidelines below to use your computer comfortably and to avoid health problems. Computer environment Make sure that the computer: • Is used on a stable surface, stand or table. A fall can seriously damage the computer.
  • Page 9 • Is not placed on a carpet or any other surface that may have an electrical charge. Cables Make sure that: • Cables are not strained and that there is no risk of people walking or tripping over them. • Other devices do not crush the cables. •...
  • Page 10 Cleaning your computer • Always unplug your computer from the power outlet before cleaning it. • Do not use liquid or aerosol cleaners, use a damp cloth instead. • Never spray cleaning product directly on the screen. • If you spill liquid on your computer, switch it off immediately, unplug the AC adapter, remove the battery and make sure it is completely dry before switching it on again.
  • Page 11: Health Precautions

    • the product has been dropped or the case has been damaged • the product exhibits a distinct change in performance, indicating a need for service • the product does not operate normally after following the operating instructions Note: Adjust only those controls that are covered by the operating instructions, since improper adjustment of other controls may result in damage and will often require extensive work by a qualified technician to restore the product to normal condition.
  • Page 12 • To protect your hearing, when using speakers or headphones, increase volume gradually until you can hear clearly and comfortably; do not increase the volume level after your ears have adjusted. Do not listen to high volumes for extended periods. Do not increase the volume to block out noisy surroundings;...
  • Page 13 consciousness, disorientation, involuntary movement convulsion, IMMEDIATELY discontinue use and consult your doctor. This may happen even if the person has no medical history of epilepsy. Computer Basics -...
  • Page 14: Getting To Know Your Computer

    E T T I N G TO K N O W Y O U R C O M P U T E R After setting up your computer as illustrated in the setup instructions, let us show you around your new Gateway computer.
  • Page 15: Top View - Display

    OP VIEW DISPLAY Icon Item Webcam Display screen Microphone Description Web camera for video communication. Also called Liquid-Crystal Display (LCD), displays computer output. Internal microphone for sound recording. Getting to know your computer -...
  • Page 16: Top View - Keyboard

    OP VIEW KEYBOARD Icon Item Power button / indicator Keyboard Touchpad Description Turns the computer on and off. Indicates the computer's power status. For entering data into your computer. − Special keys are described on page 17. Touch-sensitive pointing device which functions like a computer mouse.
  • Page 17: Special Keys

    Icon Item Power indicator Battery indicator Communication indicator Click buttons (left and right) − Note: The front panel indicators are visible even when the computer cover is closed. Special keys Your computer’s keyboard includes keys that activate special functions. The function of each key is clearly marked with an icon. Icon Function Hotkey for second function...
  • Page 18 Icon Function Help Communication Display toggle Screen blank Touchpad toggle Speaker toggle Volume down Volume up Brightness down Brightness up Description Opens the User's Guide for your computer. Enables/disables the computer’s communication devices. Switches display output between the display screen, external monitor (if connected) and both.
  • Page 19 Hotkeys The computer uses hotkeys (key combinations) to access Num Lock, function keys and navigation commands. To activate hotkeys, press and hold the Fn key (bottom left) before pressing the other key in the hotkey combination. Hotkey Function Fn + Special keys Function keys (see page 17) Fn + Page Up...
  • Page 20: Rear View

    EAR VIEW Icon Item Battery bay EFT VIEW Icon Item DC-in jack Ethernet (RJ-45) port External display (VGA) port Description Houses the computer's battery pack. Description Connects to your computer’s AC adapter. Connects to an Ethernet 10/100/1000-based network. Connects to a display device (e.g., external monitor, LCD projector).
  • Page 21: Right View

    Icon Item Ventilation and cooling fan USB 2.0 port IGHT VIEW Icon Item Multi-in-1 card reader Description Allows the computer to stay cool. − Do not cover or obstruct the openings. Connect to USB devices (e.g., USB mouse, USB camera). Description Accepts Secure Digital (SD), MultiMediaCard (MMC), Memory Stick PRO (MS PRO), xD-...
  • Page 22 Accepts inputs from external microphones. Connects to audio line-out devices (e.g., speakers, headphones). − Supports compatible 3.5 mm headsets with built-in microphone (e.g. Acer smart handheld headsets). Connect to USB devices (e.g., USB mouse, USB camera). Connects to a Kensington-compatible computer security lock.
  • Page 23: Base View

    ASE VIEW Icon Item Ventilation and cooling fan Memory compartment Hard disk bay Description Allows the computer to stay cool. − Do not cover or obstruct the openings. Houses the computer's main memory. Houses the computer's hard disk (secured with screws). Getting to know your computer -...
  • Page 24 Icon Item Battery release latch Battery bay Battery lock Speakers Description Releases the battery for removal. Insert a suitable tool and slide to release. Houses the computer's battery pack. Locks the battery in position. Deliver stereo audio output.
  • Page 25: Upgrading Your Computer

    P G R A D I N G YOUR C O M P U T ER XPANDING THROUGH OPTIONS Your computer offers you many options for a complete computing experience. Connectivity options Ports allow you to connect peripheral devices to your computer. For instructions on how to connect different external devices to the computer, read the following section.
  • Page 26 If the card contains some files, the appear (this depends on the contents of the card) and ask you if you wish to use a program to access the contents of the card. Select an option here if it is appropriate, otherwise select Cancel. If the card contains no files, or unknown files, a window will open showing the contents of the card.
  • Page 27 Universal Serial Bus (USB) The USB port is a high-speed serial bus which allows you to connect USB peripherals without taking up system resources. Certain computers may include one or more USB 3.0 ports. These resemble standard USB ports, except they include additional internal connections and are blue.
  • Page 28 Follow these steps to connect an monitor to your computer: 1. Check that the computer is powered off and the monitor power switch is turned off. 2. Attach the video cable to the monitor port on the computer. Secure the cable connection with the screws provided. 3.
  • Page 29 High-Definition Multimedia Interface (only for certain models) HDMI (High-Definition Multimedia Interface) is an industry-supported, video interface. HDMI provides an interface between any compatible digital audio/video source, such as a set-top box, DVD player, and A/V receiver and a compatible digital audio and/or video monitor, such as a digital television (DTV), over a single cable.
  • Page 30: Power Supply

    POWER ADAPTER Your computer can use the supplied external power adapter (a power 'brick') to run on AC power. A power cable is provided that is appropriate for the country where the computer was purchased. The power adapter provides adequate power to run your computer and recharge the battery pack at the same time.
  • Page 31: Battery Pack

    Warning: The AC adapter and the underside of the computer can become hot after prolonged use. This is normal, but may cause injury with prolonged contact. ATTERY PACK The computer uses a battery pack that gives you extended use between charges. Battery pack characteristics The battery pack has the following characteristics: •...
  • Page 32 Maximizing the battery’s life Like all other batteries, your computer’s battery will degrade over time. This means that the battery's performance will diminish with time and use. To maximize your battery’s life, you are advised to adhere to the recommendations set out below. Conditioning a new battery pack Before you use a battery pack for the first time, there is a “conditioning”...
  • Page 33: Installing Or Removing The Battery Pack

    Warning: Do not expose battery packs to temperatures below 0 °C (32 °F) or above 45 °C (113 °F). Extreme temperatures may adversely affect the battery pack. By following the battery conditioning process you condition your battery to accept the maximum possible charge. Failure to follow this procedure will prevent you from obtaining the maximum battery charge, and will also shorten the effective lifespan of the battery.
  • Page 34: Charging The Battery

    To install a battery pack: 1. Align the battery with the open battery bay; make sure that the end with the contacts will enter first, and that the top surface of the battery is facing up. 2. Slide the battery into the battery bay and gently push until the battery locks in place.
  • Page 35: Battery-Low Warning

    Checking the battery level The Windows power meter indicates the current battery level. Rest the cursor over the battery/power icon on the taskbar to see the battery’s present charge level. Optimizing battery life Optimizing battery life helps you get the most out of battery operation, prolonging the charge/recharge cycle and improving recharging efficiency.
  • Page 36 Warning: Connect the AC adapter as soon as possible after the battery-low warning appears. Data will be lost if the battery to become fully depleted and the computer shuts down. When the battery-low warning appears, the recommended course of action depends on your situation: Situation The AC adapter and a power outlet are...
  • Page 37: Software

    SING INDOWS AND YOUR SOFTWARE Gateway computers include software to help you use your computer; the programs and categories available on your computer depend on the model purchased. Most of this software is ’pre-installed’ and ready to be used; however some software may be provided on a CD or DVD and must first be installed if you wish to use it.
  • Page 38: Productivity Software

    from the most recent online threats and protects your personal data (bank account credentials, credit card numbers, passwords, and more). Productivity software Work Great with Microsoft® Office 2010 - Express your ideas, solve problems and simplify everyday projects with Office 2010. Photo editing - Easily edit and print your photos with Windows Live Photo Gallery.
  • Page 39 Windows Media Player Windows Media Player CDs or most video files. Note: It is not recommended that you use Windows Media Player to play DVD movies. Other media players (such as Windows Media Center) provide additional playback options. Windows Media Center (optional) Certain computers include all- in-one media ‘centers’...
  • Page 40 Setup Caution: If your computer includes a remote control or TV tuner they must be connected and active before starting the media program for the first time. The first time you start the media program, it will start a setup wizard, which will configure some basic settings.
  • Page 41 AutoPlay AutoPlay The Windows you to choose the way Windows handles media files on devices with removable storage (digital camera, CD, DVD, etc). If you have inserted a disk that contains files (such as a DVD, USB key or memory card), Windows will display a dialog box and ask you to choose how you want to open the files.
  • Page 42: Playing Dvd Movies

    Codecs A codec is software that is used to compress or decompress a digital media file, such as a song or video. Windows Media Player and other programs use codecs to play and create digital media files. For example, when you rip a song from an audio CD to your computer, the player uses the Windows Media Audio codec to compress the song into a compact WMA file.
  • Page 43 movie region code information. Once your DVD drive is set to a region code, it will play DVD discs of that region only. You can set the region code a maximum of five times (including the first time), after which the last region code set will remain permanent.
  • Page 44: Social Networks (Optional)

    Social networks (optional) Social Networks to quickly view your friends' updates, and make your own updates without leaving the desktop. You can recieve notifications status updates desktop, using the sidebar to monitor multiple social YouTube Flickr Note: The Social Networks application is a pre-installed option and may not be installed on all computers.
  • Page 45 automatically, click Log In, at the top of the If you just want to create a new Facebook profile, click Sign Up and follow the instructions. Note: All social activities require Internet access. Make sure you are connected to the Internet before using this application. Authorize access To receive updates, you must authorize access to your social network accounts;...
  • Page 46 YouTube If you already have a YouTube account, enter the account information and click the Log In button to activate access, otherwise select Sign up to YouTube to create an account. flickr If you already have a flickr account, click the Log In button to activate access, otherwise select Sign up to flickr to create an account.
  • Page 47 Click the arrows in the bottom bar more entries than can be shown on a page. Click on the question mark in the top bar Social Networks Click on the arrow in the top bar display a small alert bar on the top of your screen. Click the alert bar (below) to see the full window with a summary of your friends' activities.
  • Page 48 The first button, and the section viewed when a tab is first selected, News Feed Most Viewed are the (for Facebook), for YouTube and Contacts for Flickr. If there are more entries than can be shown on on page, use the arrows in the bottom bar to see more pages. Changing settings Click the settings icon to access settings for the social networks.
  • Page 49: Internet

    Social Networks (optional) The Social Networks application allows you to quickly view your friends' updates, and make your own updates without leaving the desktop. You can recieve notifications and status updates directly to your desktop, using the sidebar to monitor multiple social Facebook networks (e.g.
  • Page 50: First Steps On The Net

    IRST STEPS ON THE NET Protecting your computer It is vital to protect your computer from viruses and attacks over the Internet security offer Internet (see 58). A comprehensive Internet security program is offered when you first start your computer. You should activate this protection as soon as possible, certainly before you connect to the Internet.
  • Page 51 Dial-up Some computers include a telephone dial-up (‘modem’) connector. This allows you to connect to the Internet using your telephone line. With a dial-up connection, you cannot use the modem and the telephone simultaneously on a single phone line. This type of connection is recommended only if you have limited use of the Internet as the connection speed is low and connection time is typically charged per hour.
  • Page 52: Network Connections

    You can use your telephone and watch cable TV at the same time you are connected to the Internet. 3G (WWAN or 'Wireless Wide-Area Network') A 3G connection allows you to use cellular networks (such as those used by a mobile phone) to connect to the Internet while away from home.
  • Page 53 network is easy and allows you to share files, peripheral devices and an Internet connection. What are benefits of a wireless network? Mobility Wireless LAN systems allow you and other users of your home network to share access to files and devices connected to the network, for example a printer or scanner.
  • Page 54 services. Read carefully the documentation supplied with your Access point/router for detailed setup instructions. Network cable (RJ45) A network cable (also called RJ45 cable) is used to connect the host computer to the access point (see illustration below); this type of cable may also be used to connect peripheral devices to the access point.
  • Page 55: Surf The Net

    Turning on/off a wireless network connection Most computers feature a ‘WiFi’ button that turns the network connection on or off. If your computer has wireless access, but does Communication not feature a network on or off, or control what is shared over the network with the network management options.
  • Page 56 Internet Explorer features The image below shows the Internet Explorer browser’s start page. A brief description of some key aspects of the browser are listed below. 1. Quick tabs: Select and navigate through open tabs by displaying thumbnails of them all in a single window. 2.
  • Page 57 5. Address bar: Type in an Internet address (e.g. www.gateway.com) and press the Enter key on your keyboard, this will take you directly to the address you typed. 6. Tabs: View multiple sites in a single browser window by switching from one site to another through tabs at the top of the browser frame.
  • Page 58: Security

    will turn yellow and a warning message will be displayed if you visit a suspected phishing site. Gateway website To get you started why not visit our website, www.gateway.com. Gateway is dedicated to provide you with on-going personalized support. Check out our needs.
  • Page 59 Definitions What is a virus? Malicious software, typically called ‘viruses’, are programs designed to infect and damage computers. Most viruses are transmitted over the Internet, emails or malicious Web sites. A typical virus will replicate and pass itself undetected to multiple computers. Other forms of nuisance, such as Trojan horses, worms or spam can infect your computer in various ways, using up resources or clogging up a network.
  • Page 60 actually monitor keystrokes and capture passwords, posing a serious security risk. What is malware? Malicious software, also known as deliberately harm your computer. For example, viruses, worms, and Trojan horses are malicious software. To help protect your computer against malware, make sure it is using up-to-date antivirus and anti- malware software.
  • Page 61 as quickly and easily as possible. The more difficult you make their job, the more likely they are to leave you alone and move on to an easier target. The tips below provide basic information on how you can prevent online fraud. Keep your computer current with the latest patches and updates One of the best ways to keep attackers away from your computer is to apply patches and other software fixes when they become available.
  • Page 62 You could think of a firewall as a sort of "policeman" that watches all the data attempting to flow in and out of your computer on the Internet, allowing communications that it knows are safe and blocking "bad" traffic such as attacks from ever reaching your computer.
  • Page 63 accumulated. The following tips can help make your online experiences secure: • Selecting a password that cannot be easily guessed is the first step toward keeping passwords secure and out of the wrong hands. Strong passwords have eight characters or more and use a combination of letters, numbers and symbols (e.g., # $ % ! ?).
  • Page 64 rarely possible, the following list contains some advice for how to share personal information safely online: • Keep an eye out for phony email messages. Things that indicate a message may be fraudulent are misspellings, poor grammar, odd phrasings, Web site addresses with strange extensions, Web site addresses that are entirely numbers where there are normally words, and anything else out of the ordinary.
  • Page 65 you to login or provide other sensitive data. Another sign that you have a secure connection is the small lock icon in the bottom of your web browser (usually the right-hand corner). • Pay attention to privacy policies on Web sites and in software. It is important to understand how an organization might collect and use your personal information before you share it with them.
  • Page 66 hard to believe, ask for someone else's opinion, read the fine print, or even better, simply ignore it. Review bank and credit card statements regularly The impact of identity theft and online crimes can be greatly reduced if you can catch it shortly after your data is stolen or when the first use of your information is attempted.
  • Page 67 Action Center To open the and Security > Action Center. Alternatively, if a security alert been reported Notification Area, next to the clock) then you can click on the notification balloon or double- click on the small Security Alert icon. Action Center indicates the status and settings used for...
  • Page 68 Certain programs need access to the Internet to function properly, or even to function at all. If this is the case, you will usually be asked to allow access when you install a program, or the first time you use it. To check firewall settings, click on Start Control Panel >...
  • Page 69 Windows Updates If you have an active Internet connection, Windows can check for important updates for your computer and install them automatically. These updates include security patches and program updates that can improve your computing experience and help protect your computer against new viruses and attacks.
  • Page 70 Caution: Please note that most security software suites provide similar functionality and will disable Windows Defender in order to improve system performance. User Account Control User Accounts changes to your computer. User Accounts will ask you for permission or an administrator password before performing actions that could potentially affect your computer's operation or that change settings that affect other users.
  • Page 71 User Account To access User Accounts and Family Safety > User Accounts. Note: You may turn off the User Account Control Messages (not recommended) in the User Account Control settings window. Internet Explorer security settings Internet sites use small files called cookies to keep track of user preferences and information.
  • Page 72: Helpdesk

    AFE COMPUTING To make the most of your new computer and ensure it runs smoothly for a long time, you should use the programs below and regularly perform the actions described in this guide. Maintenance Recommended maintenance tasks There are several tasks you should perform periodically (about once per month) to ensure your computer stays in good health: Error checking Check Disk...
  • Page 73 3. Tick Automatically fix file system errors in the options area. If you tick Scan for and attempt recovery of bad sectors, your computer will carry out the physical error checking when you next restart your computer. Click on Start to proceed. Disk Cleanup Disk Cleanup free up space on your disk drive.
  • Page 74 Disk Defragmenter With the creation and deletion of files over time, scattering occurs all over the hard disk area and affects performance. The Defragmenter helps you rearrange the items stored on your hard drive to make your computer run faster and more efficiently. Disk Defragmenter Running the computer usage) will decrease wear and tear on your hard drive and...
  • Page 75 Manage your hard disk drive (HDD) Check the remaining free space on your hard disk drive 1. Click on Start 2. Right-click on the Gateway icon and select Properties. Hard Disk Properties 3. The amount of used space and free space on your hard disk.
  • Page 76 2. Uninstall the programs you no longer use: Click on Start Features. 3. Archive files on an external hard disk drive, recordable CDs or DVDs (if your computer is equipped with a CD or DVD writer) and delete them from the hard disk. Run Windows System Tools Windows includes some convenient tools to keep your computer in good shape.
  • Page 77 Windows System Restore. System Restore monitors changes to your computer and automatically creates restore points that store your computer’s configuration each time a major change occurs (such as installing programs). It can undo harmful changes to your computer and restore settings and performance without removing your personal data files (such as documents, browsing history, photos, favorites, or emails).
  • Page 78 If you cannot access the Windows desktop: 1. Press the Alt+F10 key upon start-up when the Gateway logo appears. This will open the 2. Select Windows System Restore and click Next. Your computer will automatically restart and open System Restore options Restore your computer to an earlier time This option will return to your computer to how it was on an earlier date, without affecting your personal documents or emails (it will not...
  • Page 79: Updates

    Create a Restore Point Windows creates restore points automatically at regularly scheduled times or before certain programs or drivers are installed. This option allows you to create your own restore points when you need to. 1. Click Start > Control Panel > System and Security > System. Click on System protection in the sidebar and then click the Create...
  • Page 80 • Perform updates when prompted by Windows Automatic Updates. • Use Microsoft Windows Update. • Run Internet security Norton Internet Security can protect your computer from Internet attacks and ensure that the latest security updates have been downloaded and installed on your Norton Internet Security computer.
  • Page 81: Windows Remote Assistance

    Windows Remote Assistance Remote Assistance allows a Windows user to temporarily take over a remote Windows computer over a network or the internet to resolve issues. Remote Assistance makes it possible to diagnose and repair problems with a computer without personally visiting it. You can access Remote Assistance by clicking on Start >...
  • Page 82: Recovery

    ATEWAY ECOVERY If your computer experiences problems that are not recoverable by other methods, you may need to reinstall the Windows operating system and factory-loaded software and drivers. To ensure you can recover your computer when needed, you should create a recovery backup as soon as possible.
  • Page 83 2. To create recovery backup for the hard drive’s entire original contents, including Windows and all factory-loaded software and drivers, click Create Factory Default Disc, or if your computer has no optical drive, Create Factory Default Backup. - OR - To create recovery discs for only the factory-loaded software and drivers, click Create Drivers and Applications Backup.
  • Page 84 Create Factory Default Backup This dialog box tells you the estimated size of the backup file. • If you a using optical discs, it will also show the number of blank, recordable discs you will need to complete the recovery discs. Make sure that you have the required number of identical, blank discs.
  • Page 85 3. Plug in the USB disk or insert a blank disc into the drive indicated in Backup to list, then click Next. You will be shown the backup progress on the screen. 4. Follow the process until it completes: • If you a using optical discs, the drive ejects each disc as it completes burning it.
  • Page 86: Recovering Your System

    Make sure you keep the backup in a safe place that you will remember. ECOVERING YOUR SYSTEM If Gateway support did not help fix your problem, you can use the Gateway Recovery Management computer to the same state as when you purchased it, while giving you an option to retain all settings and personal data for later retrieval.
  • Page 87: Types Of Recovery

    For instructions, see “ page 87. 3. Reset your system to its factory condition. If nothing else has solved the problem and you want to reset your system to factory condition, see “ condition ” on page 90. Types of recovery Returning to a previous system condition Microsoft System Restore periodically takes ’snapshots’...
  • Page 88 3. Click on he restore point you want, click on Next, then Finish. A confirmation message box appears. 4. Click on Yes. Your system is restored using the restore point you specified. This process may take several minutes, and may restart your computer.
  • Page 89 • Click on the Applications. The opens. If you are recovering from a driver and application recovery backup on optical discs: • Insert the driver and application recovery backup disc (’Apps/ Drivers Recovery Backup’) into the disc drive. • Restart you computer and wait for the program to start, then go to "Reinstalling drivers or applications"...
  • Page 90 • Click Reinstall Drivers or Application from a USB device, then go to "Reinstalling drivers or applications" on page 90. Reinstalling drivers or applications 1. Click on Contents. A list of software and device drivers opens. 2. Click on the install icon for the item you want to install, then follow the on-screen prompts to complete the installation.
  • Page 91 Caution: This complete recovery deletes everything on your hard drive, then reinstalls Windows and all software and drivers that were pre-installed on your system. If you can access important files on your hard drive, back them up now. • If you can still run Windows, see “ below.
  • Page 92 process may take a while, but a Gateway Recovery Management screen shows you its progress. When the recovery has finished, a dialog box prompts you to restart your computer. 5. Click on OK. Your computer restarts. 6. Follow the on-screen prompts for first-time system setup. Recovering from the hard drive during startup To reinstall Windows and all pre-installed software and drivers: 1.
  • Page 93 Caution: Continuing the process will erase all files on your hard drive. 2. If it is not already enabled, you must enable the 1. Press F2 when starting your computer. 2. Use the left or right arrow keys to select the Main menu. 3.
  • Page 94: Regulatory Information

    E G U L A T O R Y I N F O R M A T I O N IRELESS DEVICES Caution: Wireless devices are not user-serviceable. Do not modify them in any way. Modification to a wireless device will void the authorization to use it. Contact Gateway for service information.
  • Page 95: Regulatory Information

    equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio or television reception. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause interference to radio and television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:...
  • Page 96 (CFR 47) ELECOMMUNICATIONS PER OF THE ODE OF EDERAL EGULATIONS APPLICABLE TO PRODUCTS FITTED WITH MODEMS Your modem complies with Part 68 of the Code of Federal Regulations (CFR 47) rules. On the computer or modem card is a label that contains the FCC registration number and Ringer Equivalence Number (REN) for this device.
  • Page 97 − Perform such activities in the off-peak hours such as early morning or late evenings. The United States Telephone Consumer Protection Act of 1991 makes it unlawful for any person to use a computer or other electronic device to send any message via a telephone fax machine unless such message clearly contains, in a margin at the top or bottom of each transmitted page or on the first page of the transmission, the date and time it is sent, an identification of the business, other entity, or other individual...
  • Page 98 Le présent appareil numérique n’émet pas de bruits radioélectriques dépassant les limites applicables aux appareils numériques de Classe B prescrites dans le règlement sur le brouillage radioélectrique édicté par Industrie Canada. ELECOMMUNICATIONS PER COMPLIANT MODEM The Industry Canada label identifies certified equipment. This certification means that the equipment meets certain telecommunications network protective, operation, and safety requirements.
  • Page 99 The Ringer Equivalence Number (REN) assigned to each terminal device provides an indication of the maximum number of terminals allowed to be connected to a telephone interface. The termination on an interface may consist of any combination of devices subject only to the requirement that the sum of the Ringer Equivalence Numbers of all the devices does not exceed 5.
  • Page 100 EN60950-1: Product Safety. If your computer includes a telecommunication network board, the input/output socket is classified as Telecommunication Network Voltage (TNV-3). Note for computers equipped with wireless controllers and wired modems: Hereby, Gateway, declares that the wireless devices provided with this computer include a low power radio transmitter in full compliance with the essential requirements and other relevant provisions of Directive 1999/05/EC for Low Voltage, EMC and RF of the R&TTE.
  • Page 101 Radio frequency interference The manufacturer is not responsible for any radio or TV interference caused by unauthorised modifications to this equipment. ONNECTIONS AND REMOTE EARTHS PELV (Protected Extra Low Voltage) To ensure the extra-low voltage integrity of the equipment, only connect equipment with mains-protected electrically-compatible circuits to the external ports.
  • Page 102 Under no circumstances should the user attempt to disassemble the power supply. The power supply has no user-replaceable parts. Inside the power supply are hazardous voltages that can cause serious personal injury. A defective power supply must be returned to your dealer. Power cables and plug This Product requires a three-wire grounded power cord and plug.
  • Page 103 During product certification, Gateway used the following cable quality: − USB2.0 Certified Cables from Hama 46778 − IEEE1394 shielded FireWire from Hama 50011 − RCA-RCA shielded Audio/Video Cables from Thomson KHC001M, KHC012M, KHC028M − Stereo Jack shielded Audio cables from Hama 43330H, 42714H Heat Build-up and Portable Computers The AC adapter and the underside of the computer can become hot after prolonged use.
  • Page 104 ACKAGING The packaging of this product is compliant with the European Environmental Directive 94/62/EC from December 20 th 1994 and its equivalent in the French Legislation by the Decree 98-638 from july 20 th 1998. OMPLIANT WITH USSIAN REGULATORY CERTIFICATION...
  • Page 105: Environment

    N V I R O N M E N T UR COMMITMENT TO ENVIRONMENTAL PROTECTION Environment has been at the heart of our products. Gateway is committed to limit the environmental impact of its products during product lifecycle. Starting at design phase, with a very strict procurement policy, maximum attention is given to electronic components in order to limit their weight in heavy metals such as lead, cadmium, chromium, mercury, etc.
  • Page 106 with your local authority, or by returning your old equipment to your retailer if you are replacing it. For information, visit www.gateway.com/about/corp_responsibility/ environment.php. Battery disposal (when applicable) Before disposing of your equipment ensure that you have removed any batteries that may be fitted in the equipment. European law states that batteries must be collected for disposal separately from household waste.
  • Page 107: Software License

    O F T W A R E L IC E NS E Note: Most of the software applications are already preinstalled on your Gateway computer. They are ready to use or to set up. However, some titles require a CD or DVD to run. You will find these discs in your computer's packaging.
  • Page 108 is not “in use.” If the anticipated number of users of the SOFTWARE will exceed the number of applicable Licenses, then you must have a reasonable mechanism or process in place to assure that the number of persons using the SOFTWARE concurrently does no exceed the number of Licenses.
  • Page 109 The Free Software is distributed in the hope that, but it will be useful WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. The provisions of the GNU General Public License shall always apply. You may access http://www.gnu.org directly to obtain a copy of the GPL or write to the free Software Foundation, Inc.
  • Page 110: Index

    ... 39 Audio CDs ... 106 Batteries ... 106 battery disposal battery pack battery-low warning ... 31 characteristics ... 34 charging checking charge level ... 33 installing ... 36 low conditions ... 9, 101 Cables charging ... 34 checking level Cleaning your computer ...
  • Page 111 Electronic Program Guide ... 105 Environment ... 60, 67 Firewall HDD (Hard Disk Drive) ... 73 Free space ... 75 Management ... 101 Interference Internet ... 50 Connection Keyboard LAN (Local Area Network) Maintenance ... 75 HDD management ... 76 System tools ...
  • Page 112 ... 25 ports ... 9 Power cords Recovery ... 77 System Restore Regulatory Information Removable media devices ... 72 Safe Computing ... 8 Safety precautions Security ... 60 Antivirus ... 69, 79 Updates Windows Action Center ... 49 Social Networks Software Removing software ...
  • Page 113 ... 21 right ... 7 Warranty ... 37 Welcome Center ... 52 WiFi Windows ... 77 System Restore ... 37 Using Windows ... 37 Welcome Center Windows Action Center Windows automatic updates Windows Defender Windows Media Center Windows Media Player Windows Remote Assistance ...

Table of Contents