Table of Contents

Advertisement

Quick Links

User's Manual

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the Predator 17 X GX-792 and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

Summary of Contents for Acer Predator 17 X GX-792

  • Page 1 User’s Manual...
  • Page 2 Sign up for an Acer ID and enjoy great benefits Open the Acer Portal app to sign up for an Acer ID or sign in if you already have an Acer ID. There are three great reasons for you to get an Acer ID: •...
  • Page 3: Table Of Contents

    Table of contents - 3 A B L E O F C O N T E N T S First things first Record a macro ........43 Your guides ............ 6 Adjust the keyboard backlight ..45 Basic care and tips for using your Securing your computer computer............
  • Page 4 4 - Table of contents How do I turn off my computer? ..75 Troubleshooting tips ......... 81 How do I unlock my computer? ..76 Error messages ..........81 How do I set the alarm? ......77 Internet and online security Where are my apps?.........
  • Page 5 Getting started... In this section you will find: • Useful information on caring for your computer and your health • Where to find the power button, ports and connectors • Tips and tricks for using the touchpad and keyboard • How to create recovery backups •...
  • Page 6: First Things First

    There are two ways to download the User’s Manual. You must first be connected to the internet. 1. Open Acer Care Center from the desktop and select My System > Summary and click User’s Manual to download the User’s Manual.
  • Page 7: Basic Care And Tips For Using Your Computer

    Your computer will serve you well if you take care of it. • Only use the adapter provided with your device, or an Acer-approved adapter to power your device. • Do not expose the computer to direct sunlight. Do not place it near sources of heat, such as a radiator.
  • Page 8: Taking Care Of Your Ac Adapter

    8 - First things first • Do not expose the computer to rain or moisture. • Do not spill water or any liquid on the computer. • Do not subject the computer to heavy shock or vibration. • Do not expose the computer to dust or dirt. •...
  • Page 9: Your Predator Notebook Tour

    Your Predator notebook tour - 9 O U R R E D A T O R N O T E B O O K T O U R After setting up your computer as illustrated in the Setup Guide, let us show you around your new Predator computer. Screen view Icon Item Description...
  • Page 10: Keyboard View

    10 - Your Predator notebook tour Keyboard view Icon Item Description Hard drive Indicates when the computer’s indicator hard drive is active. Indicates the computer’s battery status. Charging: The light shows Battery amber when the battery is indicator charging. Fully charged: The light shows red when in AC mode.
  • Page 11 Your Predator notebook tour - 11 Icon Item Description Keys that allow you to change computer settings to suit your current game. Programmable You can define settings for each keys key from PredatorSense; please refer to the PredatorSense chapter in your User’s Manual. Touchpad Touch-sensitive pointing device.
  • Page 12: Left View

    12 - Your Predator notebook tour Left view Icon Item Description DC-in jack Connects to an AC adapter. USB ports Connect to USB devices. Connects to an external Mic-in jack microphone for recording audio. Headset/ Connects to audio devices (e.g., speaker jack speakers, headphones) Accepts one Secure Digital (SD...
  • Page 13: Right View

    Your Predator notebook tour - 13 Right view 3 4 5 Icon Item Description Connects to USB devices with a USB Type-C / USB Type-C connector. Thunderbolt 3 Supports Thunderbolt ™ port displays. USB port with power-off Connects to USB devices. charging USB port Connects to USB devices.
  • Page 14: Base View

    Houses the computer’s main storage and memory. Main storage You may upgrade your and memory computer’s main storage and compartment memory. Acer recommends asking an approved service center to do this. Simulates removing and Battery reset reinstalling the battery. pinhole Insert a paperclip into the hole and press for four seconds.
  • Page 15 Your Predator notebook tour - 15 Icon Item Description Reduces dust accumulation, Acer enabling the components to DustDefender stay cool, perform better and last longer.
  • Page 16: Using The Keyboard

    16 - Using the keyboard S I N G T H E K E Y B O A R D The keyboard has full-sized keys and a separate numeric keypad, separate cursor, lock, Windows, function and special keys. Lock keys The keyboard has three lock keys which you can toggle on and off.
  • Page 17 Using the keyboard - 17 Hotkey Icon Function Description Switches display output Display between the display screen, Fn + F5 toggle external monitor (if connected) and both. Turns the display screen Fn + F6 Display off backlight off to save power. Press any key to return.
  • Page 18: Windows Keys

    18 - Using the keyboard Windows keys The keyboard has two keys that perform Windows-specific functions. Description Pressed alone it returns to the Start screen or to return to the last open app. Windows key It can also be used with other keys for special functions, please check Windows Help.
  • Page 19: Using The Precision Touchpad

    Using the Precision Touchpad - 19 S I N G T H E R E C I S I O N O U CH P A D The touchpad controls the arrow (or 'cursor') on the screen. As you slide your finger across the touchpad, the cursor will follow this movement.
  • Page 20 20 - Using the Precision Touchpad Two-finger slide Swiftly scroll through web pages, documents and playlists by placing two fingers on the touchpad and moving both in any direction. Two-finger pinch Zoom in and out of photos, maps and documents with a simple finger-and- thumb gesture.
  • Page 21: Changing Touchpad Settings

    Using the Precision Touchpad - 21 Changing touchpad settings To change the touchpad settings to suit your personal requirements, please do the following. 1. In the icon tray in the lower right-hand corner of the screen, select Notifications icon open Notifications pane.
  • Page 22 22 - Using the Precision Touchpad moving if you accidentally tap the touchpad with your palm while working. Scroll down to see more settings.
  • Page 23: Recovery

    Predator provides Acer Care Center, which allows you to reset your PC, refresh your PC, or create a factory default backup. Note Acer Care Center is only available with a pre-installed Windows operating system. Important We recommend that you create a Factory Default Backup as soon as possible.
  • Page 24 24 - Recovery 2. Select the Backup tab and click Get Started for Create Factory Default Backup to open the Recovery Drive window. 3. Make sure Backup system files to the recovery drive is selected and click Next. 4. Plug in the USB drive and wait for the PC to detect the USB drive then click Next.
  • Page 25 Recovery - 25 • Since the recovery backup requires at least 8 GB of storage after formatting, it is recommended to use a USB drive with a capacity of 16 GB or larger. 5. Everything on the drive will be deleted. Click Create to continue.
  • Page 26: Backing Up Your Wireless And Lan Drivers

    26 - Recovery Backing up your wireless and LAN drivers Back up your wireless and LAN drivers. You can use these backups to install the wireless and LAN drivers if you install another operating system. 1. From Start, select All apps then Predator. Select Predator Recovery Management in the list of Predator apps.
  • Page 27 Recovery - 27 3. Select Keep my files to refresh your PC and reinstall your operating system without removing your personal files. Click Next to continue. Important If you have apps installed on your PC, they will be removed. 4. Resetting the PC will reinstall Windows, change settings back to their factory defaults and remove all preinstalled apps and programs without removing your personal files.
  • Page 28: Reset This Pc And Remove Everything

    28 - Recovery Reset this PC and remove everything 1. From Start, select All apps then Predator. Select Predator Recovery Management in the list of Predator apps. 2. Select the Restore tab and click Get Started to Choose an option. 3.
  • Page 29 Recovery - 29 keeping your computer. This process will take longer, but will be more secure. Warning Selecting "Remove files and clean the drive" will remove all of your personal files and accounts, along with pre-existing drivers that may affect your Windows installation. 5.
  • Page 30: 30 - Using A Bluetooth Connection

    30 - Using a Bluetooth connection S I N G A L UE T O O T H C O N N E C T I O N Bluetooth is a technology enabling you to transfer data wirelessly over short distances between many different types devices.
  • Page 31 Using a Bluetooth connection - 31 Bluetooth on your computer is disabled by default. To enable your computer’s Bluetooth adapter, do the following: 1. Press the Windows key or select the Windows Start button > Settings > Devices > Bluetooth, and click the toggle under Bluetooth to enable/disable it.
  • Page 32 32 - Using a Bluetooth connection 4. A code displays on your computer, which should match the code displayed on your device. Select Yes. Then, accept the pairing from your device. Note Some devices using older versions of the Bluetooth technology require both devices to enter a PIN.
  • Page 33: Connecting To The Internet

    Connecting to the Internet - 33 O N N E CT I N G T O T H E N T E R N E T This chapter includes general information on types of connections, and getting connected to the internet. Some of this information may not apply to your computer.
  • Page 34 34 - Connecting to the Internet networks during setup. Select your network and enter the password if required. Predator notebook computers feature an Airplane mode hotkey that turns the network connection on or off. You can use the network management options to turn your wireless network on/off or control what is shared over the network.
  • Page 35 Connecting to the Internet - 35 4. Select Network & internet. 5. You will see a list of available wireless networks. Select the one you wish to use.
  • Page 36: Connecting With A Cable

    36 - Connecting to the Internet 6. Once you select a wireless network, select Connect. 7. If required, enter the network’s password. Connecting with a cable Built-in network feature Plug one end of a network cable into the network port on your computer, and the other end into a port on your router.
  • Page 37: Connecting To A Cellular Network

    Connecting to the Internet - 37 (Refer to the image below.) Then, you'll be ready to get online. Connecting to a cellular network If your computer has a SIM slot, you can connect to the internet using a cellular phone network. To do this, you must have a compatible SIM card and a data contract with your cellular provider.
  • Page 38: 38 - Predator Bluelight Shield

    38 - Predator Bluelight Shield R E D A T O R L U E L I G H T H I E L D Predator Bluelight Shield can be enabled to reduce the blue- light emissions from the screen to protect your eyes. To configure Predator Bluelight Shield, Search for ’Predator Quick Access’.
  • Page 39: Predatorsense

    PredatorSense - 39 R E D A T O R E N S E PredatorSense helps you to gain the edge in your games by allowing you to overclock processors, record macros, and assign them to programmable keys. Multiple profiles allow you to quickly switch between key functions.
  • Page 40: Overclocking

    30%, overclocking options will be disabled until the AC adapter is reconnected and battery charge is over 30%. Note Acer is not responsible for any damages incurred from overclocking if any third party tools are used to overclock the CPU or graphics besides PredatorSense. Warning This system is designed to support overclocking for both the CPU and GPU.
  • Page 41: Predatorsense Settings

    PredatorSense - 41 PredatorSense settings Click the Settings icon to change settings for your Predator system. You can set the fan to maximum speed or disable sticky keys. The Multimedia Mode Settings buttons at the bottom of the screen automatically adjust the system’s display and audio settings for different scenarios.
  • Page 42: Create A New Profile

    42 - PredatorSense Click Edit next to the preferred hotkey and select an action for that hotkey to perform. Click Apply. Create a new profile From the main page, click Edit to launch the Profile management page; open the Key assignment tab. Click the + icon beneath the Hotkey profiles list to add a new profile.
  • Page 43: Record A Macro

    PredatorSense - 43 Double-click the name to enter a new name for the profile. Click the arrows above or below the P icon to adjust each group of functions for the hotkeys. The P icon color corresponds to the color the physical P key will assume when that group is active.
  • Page 44 44 - PredatorSense Click the Menu bar to show a list of available macros, then click + New macro to record a new macro. You will be asked to enter a name for the new macro. Click OK, then click Start recording. The macro recorder will record your keystrokes.
  • Page 45: Adjust The Keyboard Backlight

    PredatorSense - 45 Adjust the keyboard backlight The keyboard backlight is divided into four zones, which you can turn on or off independently. Click Edit to launch the Profile management page; open the Lighting tab. Click the slider under each zone to turn the backlight on or off for that zone.
  • Page 46 Keeping your computer and data safe... In this section you will find: • How to secure your computer • Setting passwords • What you need to prepare when you’re traveling • How to get the most out of your battery...
  • Page 47: Securing Your Computer

    Securing your computer - 47 E C U R I N G Y O U R C O M P U T E R Your computer is a valuable investment that you need to take care of. Learn how to protect and take care of your computer.
  • Page 48: Entering Passwords

    48 - Securing your computer password checkpoints on boot-up and resume from Hibernation (if available) for maximum security. Important Do not forget your Supervisor Password! If you forget your password, please get in touch with your dealer or an authorized service center.
  • Page 49: Bios Utility

    BIOS utility - 49 B I O S U T I L I T Y The BIOS utility is a hardware configuration program built into your computer's BIOS. Your computer is already properly configured and optimized, and you do not normally need to run this utility. However, if you encounter configuration problems, you may need to run To activate the BIOS utility, press F2 while the computer logo is being displayed.
  • Page 50: Power Management

    50 - Power management O W E R M A N A G E M E N T This computer has a built-in power management unit that monitors system activity. System activity refers to any activity involving one or more of the following devices: keyboard, mouse, hard disk, peripherals connected to the computer, and video memory.
  • Page 51 Power management - 51 5. Select Change settings that are currently unavailable. 6. Scroll down and disable Turn on fast startup. 7. Select Save changes.
  • Page 52: Battery Pack

    52 - Battery pack A T T E R Y P A C K The computer uses an embedded Lithium battery that gives you long use between charges. Battery characteristics The battery is recharged whenever you connect the computer to the AC adapter. Your computer supports charge-in-use, enabling you to recharge the battery while you continue to operate the computer.
  • Page 53: Optimizing Battery Life

    Battery pack - 53 Follow these steps again until the battery has been charged and discharged three times. Use this conditioning process for all new batteries, or if a battery hasn't been used for a long time. Warning Do not expose battery packs to temperatures below 0° C (32° F) or above 45°...
  • Page 54: Checking The Battery Level

    54 - Battery pack • Excessive recharging decreases the battery life. • Look after your AC adapter and battery. Checking the battery level The power meter indicates the current battery level. Rest the cursor over the battery/power icon on the taskbar to see the battery's present charge level.
  • Page 55: Traveling With Your Computer

    Traveling with your computer - 55 R A V E L I N G W I T H Y O U R C O M P U T E R This section gives you tips and hints to consider when moving around or traveling with your computer.
  • Page 56: What To Bring To Meetings

    56 - Traveling with your computer Press the Windows key + C, click Settings > Power then click Shut Down You can put the computer in Sleep mode by pressing the Sleep hotkey or by closing the display. When you are ready to use the computer again, open the display and, if necessary, press and release the power button.
  • Page 57: What To Take With You

    Traveling with your computer - 57 • Pack the computer in a protective case that can prevent the computer from sliding around and cushion it if it should fall. Warning Avoid packing items next to the top cover of the computer. Pressure against the top cover can damage the screen.
  • Page 58: Traveling With The Computer

    58 - Traveling with your computer a second AC adapter, you can avoid carrying the extra weight to and from home. If you use your computer at home for significant periods of time, you might also want to add an external keyboard, monitor or mouse.
  • Page 59: Traveling Internationally

    Traveling with your computer - 59 • If possible, have the computer inspected by hand. Airport security X-ray machines are safe, but do not put the computer through a metal detector. Traveling internationally Important Check with your airline for any special requirements for travelling with Lithium batteries.
  • Page 60 60 - Traveling with your computer compatible with the local AC voltage. Do not use converter kits sold for appliances to power the computer. • If you are using the modem, check if the modem and connector are compatible with the telecommunications system of the country you are traveling in.
  • Page 61 Ports and connectors... In this section you will find: • Information on the ports and connectors fitted to your computer...
  • Page 62: Universal Serial Bus (Usb)

    62 - Universal Serial Bus (USB) ( U S B ) N I V E R S A L E R I A L The USB port is a high-speed port which allows you to connect USB peripherals, such as a mouse, an external keyboard, additional storage (external hard disks), or any other compatible device.
  • Page 63 Universal Serial Bus (USB) - 63 or turned off. Additionally, you can use a USB hub to connect multiple devices to a single USB port. Important When removing a USB storage device, you should right-click on the USB icon in the Windows task bar and select "Eject <device>" to tell the operating system to stop using the device before removing it.
  • Page 64: 64 - Thunderbolt 3 Port

    64 - Thunderbolt 3 port H U N D E R B O L T P O R T A Thunderbolt 3 port allows you to easily connect devices with a Type-C connector to your computer, such as additional storage (e.g. an external drive), displays, other...
  • Page 65 Thunderbolt 3 port - 65 Important When removing a USB storage device, you should right-click on the USB icon in the Windows task bar and select "Eject <device>" to tell the operating system to stop using the device before removing it. Failure to do this may result in data loss or damage to your peripheral.
  • Page 66: Memory Card Reader

    66 - Memory card reader E M O R Y C A R D R E A D E R Memory cards are used in a wide selection of digital cameras, tablets, MP3 players and mobile phones. Inserting a memory card 1.
  • Page 67: Video And Audio Connectors

    Video and audio connectors - 67 I D E O A N D A U D I O C O N N E C T O R S Connect to a monitor with a VGA or DVI port (the type of connection supported depends...
  • Page 68 68 - Video and audio connectors plugging in an external microphone disables the built-in microphone. Note Some computers have a single "combo" port that allows you to use single-pin headsets with a built-in microphone. These headsets are most commonly used with smartphones.
  • Page 69: Hdmi

    HDMI - 69 H DM I HDMI (High-Definition Multimedia Interface) is a high- quality, digital audio/video interface. HDMI allows you to connect any compatible digital audio/video source, such as your computer, a set-top box, DVD player, and audio/video receiver to any compatible digital audio and/or video monitor, such as a digital television (DTV) with a single cable.
  • Page 70 Got a question? In this section you will find: • Frequently asked questions • Tips for using Windows 10 • Troubleshooting information • How to protect yourself while online • Where find Predator service center contact information...
  • Page 71: Frequently Asked Questions

    Frequently asked questions - 71 R E Q U E N T L Y A S K E D Q U E S T I O N S The following is a list of possible situations that may arise during the use of your computer. Easy solutions are provided for each one.
  • Page 72 72 - Frequently asked questions • The computer may be in Sleep or Hibernate mode (if there is a power LED, it will flash). Press and release the power button to resume. No audio is heard from the computer. Check the following: •...
  • Page 73: Requesting Service

    Attach your proof-of-purchase to the ITW passport. If the country you are traveling in does not have an Predator-authorized ITW service site, you can still get in contact with offices worldwide. Please visit www.acer.com.
  • Page 74 74 - Frequently asked questions Before you call Please have the following information available when you call Predator for online service, and please be at your computer when you call. With your support, we can reduce the amount of time a call takes and help solve your problems efficiently.
  • Page 75: Tips And Hints For Using Windows 10

    F r e q u en tl y a sk Frequently asked questions - 75 Tips and hints for using Windows 10 We know this is a new operating system that will take some getting used to, so we've created a few pointers to help you get started.
  • Page 76: How Do I Unlock My Computer

    76 - Frequently asked questions How do I unlock my computer? Press the space bar and select a user account icon to unlock the computer. If your account has a password set, you will need to enter the password to continue. Can I personalize the Lock screen? You can personalize the lock screen with a different image, to run a slideshow of images, or to show you quick status...
  • Page 77: How Do I Set The Alarm

    Frequently asked questions - 77 can drag the tile to an existing group on Start. You can give the group(s) a name and arrange the tiles within the groups to suit your needs. Can I make tiles bigger or smaller? Yes, you can.
  • Page 78: Where Are My Apps

    78 - Frequently asked questions 9. Select On or Off to activate or deactivate the alarm. Hour Minutes Save Delete Note The alarm will only sound if your computer is awake at the set time. Where are my apps? Move your cursor to the lower left-hand corner of the screen and select Search, start typing the name of the app you would like to open.
  • Page 79: What Is A Microsoft Id (Account)

    Frequently asked questions - 79 How do I install apps? You can download Windows Store apps from Store. You will need to have a Microsoft ID to purchase and download apps from Store. I can't find apps like Notepad and Paint! Where are they? Move your cursor to the lower left-hand corner of the screen and select Search.
  • Page 80: Where Can I Get More Information

    80 - Frequently asked questions Where can I get more information? For more information please visit the following pages: • Windows 10 information: go.acer.com/windows-tutorial • Support FAQs: support.acer.com...
  • Page 81: Troubleshooting

    F r eq ue nt ly as k e d qu est i o ns Frequently asked questions - 81 Troubleshooting This chapter shows you how to deal with common system problems. Read it before calling a technician if a problem occurs. Solutions to more serious problems require opening up the computer.
  • Page 82 82 - Frequently asked questions Error messages Corrective action Hard disk 0 Contact your dealer or an authorized extended type service center. error Contact your dealer or an authorized I/O parity error service center. Keyboard error or Contact your dealer or an authorized no keyboard service center.
  • Page 83: Internet And Online Security

    Internet and online security - 83 N T E R N E T A N D O N L I N E S E C U R I T Y First steps on the net Protecting your computer It is vital to protect your computer from viruses and attacks over internet (see...
  • Page 84 84 - Internet and online security your telephone line. With a dial-up connection, you cannot use the modem and the telephone simultaneously on a single phone line. This type of connection is recommended only if you have limited use of the internet as the connection speed is low and connection time is typically charged per hour.
  • Page 85: Network Connections

    Internet and online security - 85 device, such as a USB modem or even an appropriately equipped mobile phone. Note If your computer includes a SIM card slot, you require a compatible SIM card and a contract with a cellular provider. Before using the cellular features, check with your service provider to see if any additional charges will be incurred, especially roaming charges.
  • Page 86 86 - Internet and online security Components of a wireless LAN To set up your Wireless network at home you need to have the following: Access point (router) Access points (routers) are two-way transceivers that broadcast data into the surrounding environment. Access points act as a mediator between wired and wireless network.
  • Page 87: Surf The Net

    Internet Explorer tile or the icon located on the desktop and take your internet experience to a new level! Predator website To get you started why not visit our website, www.acer.com. Predator is dedicated to provide you with on-going personalized support. Check out our Support section to get help tailored to your needs.
  • Page 88 88 - Internet and online security pre-installed McAfee Internet Security Suite on your computer. McAfee Internet Security Suite runs quietly background to block today’s complex threats and protect your identity when you shop, bank, or browse online. McAfee Internet Security Suite blocks online identity theft, detects and eliminates spyware, removes viruses and internet worms, protects against hackers.
  • Page 89 Internet and online security - 89 go beyond simple tracking and actually monitor keystrokes and capture passwords, posing a serious security risk. What is malware? Malicious software, also known as malware, is software designed to deliberately harm your computer. For example, viruses, worms, and Trojan horses are malicious software.
  • Page 90 90 - Internet and online security they become available. regularly updating your computer, you block attackers from being able to take advantage of software flaws (vulnerabilities) that they could otherwise use to break into your system. While keeping your computer up-to-date will not protect you from all attacks, it makes it much more difficult for hackers to gain access to your system, blocks many basic and automated attacks completely, and might be enough to...
  • Page 91 Internet and online security - 91 become popular as they offer all the security software needed for online protection in a single package. Many people find using a comprehensive security suite an attractive alternative to installing, configuring and updating several different types of security software. A complete version of McAfee Internet Security Suite is pre-installed on your Predator system.
  • Page 92 92 - Internet and online security online. To take advantage of many online services, you will inevitably have to provide personal information in order to handle billing and shipping of purchased goods. Since not divulging any personal information is rarely possible, the following list contains some advice for how to share personal information safely online: •...
  • Page 93 Internet and online security - 93 in an area requesting you to login or provide other sensitive data. Another sign that you have a secure connection is the small lock icon in the bottom of your web browser (usually the right-hand corner). •...
  • Page 94 94 - Internet and online security gone wrong is by reviewing the monthly statements provided by your bank and credit card companies for anything out of the ordinary. Additionally, many banks and services use fraud prevention systems that call out unusual purchasing behavior (i.e. if you live in Texas and all of the sudden start buying refrigerators in Budapest).

Table of Contents