Table of Contents

Advertisement

Quick Links

PREDATOR TRITON 700
User's Manual

Advertisement

Table of Contents
loading

Summary of Contents for Acer PREDATOR TRITON 700

  • Page 1 PREDATOR TRITON 700 User’s Manual...
  • Page 2 Sign up for an Acer ID and enjoy great benefits Open the Acer Portal app to sign up for an Acer ID or sign in if you already have an Acer ID. There are three great reasons for you to get an Acer ID: •...
  • Page 3: Table Of Contents

    Table of contents - 3 A B L E O F C O N T E N T S First things first Creating a Lighting Profile ....39 Overclocking..........40 Your guides ............ 6 Fan control........... 41 Basic care and tips for using your Monitoring ............
  • Page 4 4 - Table of contents HDMI updates? ............73 Where can I get more information? 74 Frequently asked questions Troubleshooting........75 Requesting service ......... 67 Troubleshooting tips ......... 75 Tips and hints for using Windows Error messages ..........75 10 ..............69 Internet and online security How do I get to Start?......
  • Page 5 Getting started... In this section you will find: • Useful information on caring for your computer and your health • Where to find the power button, ports and connectors • Tips and tricks for using the touchpad and keyboard • How to create recovery backups •...
  • Page 6: First Things First

    Once you have connected to the internet, you can download updates for your computer from: http://go.acer.com/?id=17883 1. The link will open the Predator Service & Support webpage. 2. Scroll down to Drivers and Manuals and search for your model by pasting in or manually entering the serial number, SNID, or product model.
  • Page 7: Basic Care And Tips For Using Your Computer

    Your computer will serve you well if you take care of it. • Only use the adapter provided with your device, or an Acer-approved adapter to power your device. • Do not expose the computer to direct sunlight. Do not place it near sources of heat, such as a radiator.
  • Page 8: Taking Care Of Your Ac Adapter

    8 - First things first • Do not expose the computer to rain or moisture. • Do not spill water or any liquid on the computer. • Do not subject the computer to heavy shock or vibration. • Do not expose the computer to dust or dirt. •...
  • Page 9: Your Predator Notebook Tour

    Your Predator notebook tour - 9 O U R R E D A T O R N O T E B O O K T O U R After setting up your computer as illustrated in the Setup Guide, let us show you around your new Predator computer. Screen view Icon Item Description...
  • Page 10: Keyboard View

    10 - Your Predator notebook tour Keyboard view Icon Item Description The marked area is touch- sensitive. Glass Double-tap in the marked area touchpad to perform a left click. Tap with two fingers to perform a right click. For entering data into your computer.
  • Page 11: Left View

    Your Predator notebook tour - 11 Left view 4 5 6 Icon Item Description Kensington Connects to a Kensington- lock slot compatible security lock. Allows the computer to stay cool. Ventilation Do not cover or obstruct the openings. Remove the cover to connect Covered USB small USB devices, such as a port...
  • Page 12: Right View

    12 - Your Predator notebook tour Right view 2 3 4 Icon Item Description Power button Turns the computer on and off. Connects to USB devices with a USB Type-C / USB Type-C connector. Thunderbolt 3 Supports Thunderbolt 3 and ™...
  • Page 13: Rear View

    Your Predator notebook tour - 13 Rear view Icon Item Description Allows the computer to stay cool. Ventilation Do not cover or obstruct the openings. External Connects to a display device display using the high-definition (DisplayPort) DisplayPort interface. port Supports high-definition digital HDMI port video connections.
  • Page 14: Base View

    14 - Your Predator notebook tour Base view Icon Item Description Allows the computer to stay cool. Ventilation Do not cover or obstruct the openings. Simulates removing and Battery reset reinstalling the battery. pinhole Insert a paperclip into the hole and press for four seconds.
  • Page 15: Using The Keyboard

    Using the keyboard - 15 S I N G T H E K E Y B O A R D The keyboard has full-sized keys and a separate numeric keypad, separate cursor, lock, Windows, function and special keys. Lock keys The keyboard has lock keys which you can use to turn keyboard functions on and off.
  • Page 16 16 - Using the keyboard Hotkey Icon Function Description Switches display output Display between the display screen, Fn + F5 toggle external monitor (if connected) and both. Turns the display screen Fn + F6 Display off backlight off to save power. Press any key to return.
  • Page 17: Windows Keys

    Using the keyboard - 17 Windows keys The keyboard has two keys that perform Windows-specific functions. Description Pressed alone it returns to the Start screen or to return to the last open app. Windows key It can also be used with other keys for special functions, please check Windows Help.
  • Page 18: Glass Touchpad

    18 - Glass Touchpad L A S S O U C H P A D The transparent panel above your computer’s keyboard includes a touch-sensitive Precision Touchpad. The area inside the four lines on the panel reacts to finger taps and movements. Using the Precision Touchpad The touchpad controls the arrow (or 'cursor') on the...
  • Page 19: Touchpad Gestures

    Glass Touchpad - 19 Touchpad gestures Most applications support touchpad gestures, however, not all applications support all gestures: Single-finger slide Slide a finger across the touchpad to move the cursor. Single-finger press or tap Lightly tap the touchpad with your finger to perform a 'click', which will select or start an item.
  • Page 20: Changing Touchpad Settings

    20 - Glass Touchpad • Swipe down to minimize all open windows and show the Desktop; swipe upwards to restore the minimized windows. • Swipe left or right to switch between open windows. Changing touchpad settings To change the touchpad settings to suit your personal requirements, please do the following.
  • Page 21 Glass Touchpad - 21...
  • Page 22: Recovery

    Predator provides Acer Care Center, which allows you to reset your PC, refresh your PC, or create a factory default backup. Note Acer Care Center is only available with a pre-installed Windows operating system. Important We recommend that you create a Factory Default Backup as soon as possible.
  • Page 23 Recovery - 23 2. Select the Backup tab and click Get Started for Create Factory Default Backup to open the Recovery Drive window. 3. Make sure Backup system files to the recovery drive is selected and click Next. 4. Plug in the USB drive and wait for the PC to detect the USB drive then click Next.
  • Page 24 24 - Recovery • Since the recovery backup requires at least 8 GB of storage after formatting, it is recommended to use a USB drive with a capacity of 16 GB or larger. 5. Everything on the drive will be deleted. Click Create to continue.
  • Page 25: Backing Up Your Wireless And Lan Drivers

    Recovery - 25 Backing up your wireless and LAN drivers Back up your wireless and LAN drivers. You can use these backups to install the wireless and LAN drivers if you install another operating system. 1. From Start, select All apps then Predator. Select Predator Recovery Management in the list of Predator apps.
  • Page 26 26 - Recovery 3. Select Keep my files to refresh your PC and reinstall your operating system without removing your personal files. Click Next to continue. Important If you have apps installed on your PC, they will be removed. 4. Resetting the PC will reinstall Windows, change settings back to their factory defaults and remove all preinstalled apps and programs without removing your personal files.
  • Page 27: Reset This Pc And Remove Everything

    Recovery - 27 Reset this PC and remove everything 1. From Start, select All apps then Predator. Select Predator Recovery Management in the list of Predator apps. 2. Select the Restore tab and click Get Started to Choose an option. 3.
  • Page 28 28 - Recovery keeping your computer. This process will take longer, but will be more secure. Warning Selecting "Remove files and clean the drive" will remove all of your personal files and accounts, along with pre-existing drivers that may affect your Windows installation. 5.
  • Page 29: Using A Bluetooth Connection

    Using a Bluetooth connection - 29 S I N G A L UE T O O T H C O N N E C T I O N Bluetooth is a technology enabling you to transfer data wirelessly over short distances between many different types of devices.
  • Page 30 30 - Using a Bluetooth connection 3. Select the device you wish to pair from the list of discovered devices, and select Pair. 4. A code displays on your computer, which should match the code displayed on your device. Select Yes. Then, accept the pairing from your device.
  • Page 31: Connecting To The Internet

    Connecting to the Internet - 31 O N N E CT I N G T O T H E N T E R N E T This chapter includes general information on types of connections, and getting connected to the internet. For detailed information, please refer to Network connections on page 79.
  • Page 32 32 - Connecting to the Internet Predator notebook computers feature an Airplane mode hotkey that turns the network connection on or off. You can use the network management options to turn your wireless network on/off or control what is shared over the network. To connect to a wireless network, please follow the steps below.
  • Page 33 Connecting to the Internet - 33 4. Select Network & internet. 5. Make sure Wi-Fi is On and select Show available networks. 6. You will see a list of available wireless networks. Select the one you wish to use.
  • Page 34 34 - Connecting to the Internet 7. Once you select a wireless network, select Connect. 8. If required, enter the network’s password.
  • Page 35: Connecting With A Cable

    Connecting to the Internet - 35 Connecting with a cable Built-in network feature If your computer has a network port, plug one end of a network cable into the network port on your computer, and the other end into a port on your router (refer to the image below.) Then, you'll be ready to get online.
  • Page 36: 36 - Predatorsense

    36 - PredatorSense R E D A T O R E N S E PredatorSense allows you to overclock processors and control fan behavior. It also provides controls for lighting profiles, to turn sticky keys on or off and to monitor system loading. The PredatorSense main screen The main screen gives you an overview of temperatures and fan speeds.
  • Page 37: Predatorsense Settings

    PredatorSense - 37 PredatorSense settings Click the Settings icon to change settings for your Predator system. You can disable sticky keys or the Windows and menu keys, and change temperature units. Adjusting the keyboard backlight Select Lighting to see keyboard lighting options. The backlight colors of individual keys may be changed: select one or more keys (hold Ctrl and click or drag to select multiple keys), or select a set of keys (such...
  • Page 38: Dynamic Lighting

    38 - PredatorSense Dynamic lighting Select Dynamic to see a set of animated light effects. Each effect provides a animation for the backlight colors, which either repeats a pattern, or is triggered by pressing a key. Fan lighting Select the Fan tab to control the light for the fan visible through the panel above the keyboard.
  • Page 39: Creating A Lighting Profile

    PredatorSense - 39 Turn the light on or off, or adjust the color and save it in a lighting profile. Creating a Lighting Profile You can create profiles for lighting schemes and switch profiles using the menu on the main page, or in the Lighting page.
  • Page 40: Overclocking

    If the AC adapter is disconnected or if the battery charge is lower than 30%, overclocking options will be disabled. Note Acer is not responsible for any damages incurred from overclocking if any third party tools are used to overclock the CPU or graphics besides PredatorSense.
  • Page 41: Fan Control

    PredatorSense - 41 Fan control Use the fan controls to adjust the fan activity for the CPU and GPU. Activate CoolBoost™ to increase fan speed beyond the normal maximum, enhancing cooling power when the system is under heavy use. Monitoring Check the Monitoring page to check processor and system temperature and loading.
  • Page 42: 42 - Bluelight Shield

    42 - Bluelight Shield L U E L I G H T H IE L D The Bluelight Shield can be enabled to reduce blue-light emissions from the screen to protect your eyes. To configure the Bluelight Shield, Search for ’Predator Quick Access’...
  • Page 43 Keeping your computer and data safe... In this section you will find: • How to secure your computer • Setting passwords • What you need to prepare when you’re traveling • How to get the most out of your battery...
  • Page 44: Securing Your Computer

    44 - Securing your computer E C U R I N G Y O U R C O M P U T E R Your computer is a valuable investment that you need to take care of. Learn how to protect and take care of your computer.
  • Page 45: Entering Passwords

    Securing your computer - 45 password checkpoints on boot-up and resume from Hibernation (if available) for maximum security. Important Do not forget your Supervisor Password! If you forget your password, please get in touch with your dealer or an authorized service center.
  • Page 46: Bios Utility

    46 - BIOS utility B I O S U T I L I T Y The BIOS utility is a hardware configuration program built into your computer's BIOS. Your computer is already properly configured and optimized, and you do not normally need to run this utility. However, if you encounter configuration problems, you may need to run To activate the BIOS utility, press F2 while the computer logo is being displayed.
  • Page 47: Power Management

    Power management - 47 O W E R M A N A G E M E N T This computer has a built-in power management unit that monitors system activity. System activity refers to any activity involving one or more of the following devices: keyboard, mouse, hard disk, peripherals connected to the computer, and video memory.
  • Page 48 48 - Power management 6. Select Change settings that are currently unavailable. 7. Scroll down and disable Turn on fast startup. 8. Select Save changes.
  • Page 49: Battery Pack

    Battery pack - 49 A T T E R Y P A C K The computer uses an embedded Lithium battery that gives you long use between charges. Battery characteristics The battery is recharged whenever you connect the computer to the AC adapter. Your computer supports charge-in-use, enabling you to recharge the battery while you continue to operate the computer.
  • Page 50: Optimizing Battery Life

    50 - Battery pack Follow these steps again until the battery has been charged and discharged three times. Use this conditioning process for all new batteries, or if a battery hasn't been used for a long time. Warning Do not expose battery packs to temperatures below 0° C (32° F) or above 45°...
  • Page 51: Checking The Battery Level

    Battery pack - 51 • Excessive recharging decreases the battery life. • Look after your AC adapter and battery. Checking the battery level The power meter indicates the current battery level. Rest the cursor over the battery/power icon on the taskbar to see the battery's present charge level.
  • Page 52: 52 - Traveling With Your Computer

    52 - Traveling with your computer R A V E L I N G W I T H Y O U R C O M P U T E R This section gives you tips and hints to consider when moving around or traveling with your computer.
  • Page 53: What To Bring To Meetings

    Traveling with your computer - 53 Press the Windows key + C, click Settings > Power then click Shut Down You can put the computer in Sleep mode by pressing the Sleep hotkey or by closing the display. When you are ready to use the computer again, open the display and, if necessary, press and release the power button.
  • Page 54: What To Take With You

    54 - Traveling with your computer • Pack the computer in a protective case that can prevent the computer from sliding around and cushion it if it should fall. Warning Avoid packing items next to the top cover of the computer. Pressure against the top cover can damage the screen.
  • Page 55: Traveling With The Computer

    Traveling with your computer - 55 a second AC adapter, you can avoid carrying the extra weight to and from home. If you use your computer at home for significant periods of time, you might also want to add an external keyboard, monitor or mouse.
  • Page 56: Traveling Internationally

    56 - Traveling with your computer • If possible, have the computer inspected by hand. Airport security X-ray machines are safe, but do not put the computer through a metal detector. Traveling internationally Important Check with your airline for any special requirements for travelling with Lithium batteries.
  • Page 57 Traveling with your computer - 57 compatible with the local AC voltage. Do not use converter kits sold for appliances to power the computer. • If you are using the modem, check if the modem and connector are compatible with the telecommunications system of the country you are traveling in.
  • Page 58 Ports and connectors... In this section you will find: • Information on the ports and connectors fitted to your computer...
  • Page 59: Universal Serial Bus (Usb)

    Universal Serial Bus (USB) - 59 ( U S B ) N I V E R S A L E R I A L The USB port is a high-speed port which allows you to connect USB peripherals, such as a mouse, an external keyboard, additional storage (external hard disks), or any other compatible device.
  • Page 60: 60 - Thunderbolt 3 Port

    60 - Thunderbolt 3 port H U N D E R B O L T P O R T A Thunderbolt 3 port allows you to easily connect devices with a Type-C connector to your computer, such as additional storage (e.g. an external drive), displays, other...
  • Page 61: Sd Card Reader

    SD card reader - 61 C A R D R E A D E R SD (Secure Digital) cards are used in a wide selection of digital cameras, tablets, media players and cellular phones. Inserting an SD card 1. Align the card so that the connector points towards the port, with the connectors facing down.
  • Page 62: 62 - Video And Audio Connectors

    62 - Video and audio connectors I D E O A N D A U D I O C O N N E C T O R S Add an external monitor to your computer via a video port. The type of port available depends on your computer’s configuration.
  • Page 63: Hdmi

    HDMI - 63 H DM I HDMI (High-Definition Multimedia Interface) is a high- quality, digital audio/video interface. HDMI allows you to connect any compatible digital audio/video source, such as your computer, a set-top box, DVD player, and audio/video receiver to any compatible digital audio and/or video monitor, such as a digital television (DTV) with a single cable.
  • Page 64 Got a question? In this section you will find: • Frequently asked questions • Tips for using Windows 10 • Troubleshooting information • How to protect yourself while online • Where find Predator service center contact information...
  • Page 65: Frequently Asked Questions

    Frequently asked questions - 65 R E Q U E N T L Y A S K E D Q U E S T I O N S The following is a list of possible situations that may arise during the use of your computer. Easy solutions are provided for each one.
  • Page 66 66 - Frequently asked questions • The computer may be in Sleep or Hibernate mode (if there is a power LED, it will flash). Press and release the power button to resume. No audio is heard from the computer. Check the following: •...
  • Page 67: Requesting Service

    Attach your proof-of-purchase to the ITW passport. If the country you are traveling in does not have an Predator-authorized ITW service site, you can still get in contact with offices worldwide. Please visit www.acer.com.
  • Page 68 68 - Frequently asked questions Before you call Please have the following information available when you call Predator for online service, and please be at your computer when you call. With your support, we can reduce the amount of time a call takes and help solve your problems efficiently.
  • Page 69: Tips And Hints For Using Windows 10

    F r e q u en tl y a sk Frequently asked questions - 69 Tips and hints for using Windows 10 We know this is a new operating system that will take some getting used to, so we've created a few pointers to help you get started.
  • Page 70: How Do I Unlock My Computer

    70 - Frequently asked questions How do I unlock my computer? Press the space bar and select a user account icon to unlock the computer. If your account has a password set, you will need to enter the password to continue. Can I personalize the Lock screen? You can personalize the lock screen with a different image, to run a slideshow of images, or to show you quick status...
  • Page 71: How Do I Set The Alarm

    Frequently asked questions - 71 can drag the tile to an existing group on Start. You can give the group(s) a name and arrange the tiles within the groups to suit your needs. Can I make tiles bigger or smaller? Yes, you can.
  • Page 72: Where Are My Apps

    72 - Frequently asked questions 9. Select On or Off to activate or deactivate the alarm. Hour Minutes Save Delete Note The alarm will only sound if your computer is awake at the set time. Where are my apps? Move your cursor to the lower left-hand corner of the screen and select Search, start typing the name of the app you would like to open.
  • Page 73: What Is A Microsoft Id (Account)

    Frequently asked questions - 73 How do I install apps? You can download Windows Store apps from Store. You will need to have a Microsoft ID to purchase and download apps from Store. I can't find apps like Notepad and Paint! Where are they? Move your cursor to the lower left-hand corner of the screen and select Search.
  • Page 74: Where Can I Get More Information

    74 - Frequently asked questions Where can I get more information? For more information please visit the following pages: • Windows 10 information: go.acer.com/windows-tutorial • Support FAQs: support.acer.com...
  • Page 75: Troubleshooting

    F r eq ue nt ly as k e d qu est i o ns Frequently asked questions - 75 Troubleshooting This chapter shows you how to deal with common system problems. Read it before calling a technician if a problem occurs. Solutions to more serious problems require opening up the computer.
  • Page 76 76 - Frequently asked questions Error messages Corrective action Hard disk 0 Contact your dealer or an authorized extended type service center. error Contact your dealer or an authorized I/O parity error service center. Keyboard error or Contact your dealer or an authorized no keyboard service center.
  • Page 77: Internet And Online Security

    Internet and online security - 77 N T E R N E T A N D O N L I N E S E C U R I T Y First steps on the net Protecting your computer It is vital to protect your computer from viruses and attacks over the internet (see Internet security software on page 81).
  • Page 78 78 - Internet and online security Dial-up Some computers include a telephone dial-up (‘modem’) connector. This allows you to connect to the internet using your telephone line. With a dial-up connection, you cannot use the modem and the telephone simultaneously on a single phone line.
  • Page 79: Network Connections

    Internet and online security - 79 internet while away from home. The socket for a SIM card may be built in to your computer, or may require an external device, such as a USB modem or even an appropriately equipped mobile phone. Note If your computer includes a SIM card slot, you require a compatible SIM card and a contract with a cellular provider.
  • Page 80 80 - Internet and online security Components of a wireless LAN To set up your Wireless network at home you need to have the following: Access point (router) Access points (routers) are two-way transceivers that broadcast data into the surrounding environment. Access points act as a mediator between wired and wireless network.
  • Page 81: Surf The Net

    Predator website To get you started why not visit our website, www.acer.com. Predator is dedicated to provide you with on-going personalized support. Check out our Support section to get help tailored to your needs.
  • Page 82 82 - Internet and online security Ensure your software is up to date Cybercriminals rely heavily upon software or platform vulnerabilities, as they are the easiest way to sneak malware into a user's device unnoticed, sometimes with little action user's part.
  • Page 83 Internet and online security - 83 Common threats cybercriminals use Now you know a few very common ways cybercriminals try to sneak onto your device or trick you into providing private information to them directly. Here are a few of the types of malware they like to deploy once they've got into a device and what to do if you're ever infected.
  • Page 84 84 - Internet and online security botnets aren't even aware that their computer's security has become compromised! What to do if you're infected: If you're infected you probably don't realize it as bots are notoriously quiet. Your Internet Service Provider might send you a notification alerting you that they found a threat on your network and that you need to remove the bot.
  • Page 85 Internet and online security - 85 that is specifically targeted as valuable, and capture the data, such as your login credentials and passwords. Use a virtual private network (VPN) to ensure your privacy and anonymity are protected when you use public Wi-Fi. VPN services can encrypt all the data that you send and receive while using a public Wi-Fi hotspot, securing your information from hackers and other users of the same...
  • Page 86 86 - Internet and online security infected by malicious software. However, do not blame every computer problem on a virus! If you suspect your computer is infected, the first thing to do is update, if you have not already done so, and run your antivirus and anti-spyware software.

This manual is also suitable for:

Pt 715-51Pt715-51-732qPt715-51-761mPt715-51-795h

Table of Contents