Taking care of your vision ....12 download............48 Notes on using 3D images ....13 Scenario ............49 Scenario Profiles........49 Your Predator notebook tour Operating Mode .......... 53 Screen view....... 14 Fan control............. 54 Keyboard view ........... 15 Adjusting the Pulsar Lighting ....
Page 4
4 - Table of contents Universal Serial Bus (USB) Can I change the screen resolution? ............. 93 USB Type-C port Where are my apps?........ 93 What is a Microsoft ID Thunderbolt 4 port (account)?............93 Displays ............83 How do I check for Windows updates?............
Page 5
• Where to find the power button, ports and connectors • Windows 11 interface overview • Tips and tricks for using the touchpad and keyboard • How to create recovery backups • Guidelines for connecting to a network and using Bluetooth • Information on using Predator’s bundled software...
6 - First things first I RST TH INGS FI RS T We would like to thank you for making this Predator notebook your choice for meeting your mobile computing needs. Warning This product is not designed for cryptocurrency mining uses.
First things first - 7 Basic care and tips for using your computer Turning your computer off To turn the power off, do any of the following: • Use the Windows shutdown command: Press the Windows key or select the Windows Start button, select Power > Shut down.
8 - First things first • Do not expose the computer to rain or moisture. • Do not spill water or any liquid on the computer. • Do not subject the computer to heavy shock or vibration. • Do not expose the computer to dust or dirt. •...
First things first - 9 Guidelines for safe battery usage Warning When using a charging cart or a small space to simultaneously charge or operate multiple devices , the area must be well- ventilated and the temperature kept between 0 °C (32 °F) to 35 °C (95 °F) and battery charging must be stopped when 100% capacity is reached.
Page 10
10 - First things first leave your device’s battery completely discharged for a long period of time; this may cause battery deformation or damage. We recommend that the battery is checked and charged to approximately 50% capacity every 6 months. •...
Page 11
First things first - 11 occur at temperatures below 0 °C (32 °F) or above 35 °C (95 °F). The full performance of a new battery is achieved only after two or three complete charge and discharge cycles. The battery can be charged and discharged hundreds of times, but it will eventually wear out.
12 - First things first Internal battery • Do not attempt to replace a built-in rechargeable battery, battery replacement must be done by an Acer- authorized repair facility. Recharge the battery by following the instruction included in the product documentation. Taking care of your vision Long viewing hours, wearing incorrect glasses or contact lenses, glare, excessive room lighting, poorly focused...
First things first - 13 • using a display visor, such as a piece of cardboard extended from the display's top front edge. • Avoid adjusting your display to an awkward viewing angle. • Avoid looking at bright light sources for extended periods of time.
14 - Your Predator notebook tour O UR RE D ATOR NOTEB OOK TOU R After setting up your computer as illustrated in the Setup Guide, let us show you around your new Predator computer. Screen view Icon Item Description Internal digital microphones for Microphones sound recording.
Your Predator notebook tour - 15 Note This monitor uses low blue light panel. When the monitor is default setting (Preset mode: Standard), it works in compliance with TÜV Rheinland. The Low Blue Light feature on the display is designed to minimize blue light emitted from the display for better eye comfort.
Page 16
16 - Your Predator notebook tour Icon Item Description Touch-sensitive pointing device. The touchpad and selection buttons form a single surface. Press down firmly on the Touchpad touchpad surface to perform a left click. Press down firmly on the lower right corner to perform a right click.
Your Predator notebook tour - 17 Left view Icon Item Description Kensington Connects to a Kensington- lock slot compatible security lock. Allows the computer to stay Ventilation cool. and cooling Do not cover or obstruct the openings. DC-in jack Connects to an AC adapter.
18 - Your Predator notebook tour • Defined by the USB 3.2 Gen 2 specification (SuperSpeed USB) USB Type-C information • USB 3.2 Gen 2 with transfer speeds up to 10 Gbps. • Supports DisplayPort audio/video output. ™ • Compatible with Thunderbolt ™...
Your Predator notebook tour - 19 USB 3.2 Gen 2 information • USB 3.2 Gen 2 compatible ports are blue. • Compatible with USB 3.2 Gen 2 and earlier devices. • For optimal performance, use USB 3.2 Gen 2-certified devices.
20 - Your Predator notebook tour Rear view Icon Item Description Allows the computer to stay Ventilation cool. and cooling Do not cover or obstruct the openings.
Using the keyboard - 21 SI NG TH E KE YB OARD The keyboard has full-sized keys, a numeric keypad, separate cursor, lock, Windows keys and hotkeys. Hotkeys To activate hotkeys, press and hold the Fn key before pressing the other key in the hotkey combination. Hotkey Icon Function...
22 - Using the keyboard Hotkey Icon Function Description Snips a rectangle, freeform, Fn + Snipping window or full screen to PrtSc Tool your clipboard. Turns the microphones on Microphone Fn + and off. toggle Scrolls to the end of a Fn + document.
The Windows OS Desktop - 23 OS D IND OWS ESKTOP Icon Item Description Launches apps, through Pinned, Start Recommended, or All apps. Types in the texts to search on your Search computer and the Internet. Allows to switch between running Task View applications and add the virtual desktop.
24 - Using the Precision Touchpad SI NG TH E RECI SI ON O UCH PAD The touchpad controls the arrow (or 'cursor') on the screen. As you slide your finger across the touchpad, the cursor will follow this movement. The Precision Touchpad (PTP) is designed to provide a more uniform, smooth, and accurate touchpad experience.
Page 25
Using the Precision Touchpad - 25 Two-finger pinch Zoom in and out of photos, maps and documents with a simple finger-and-thumb gesture. Three-finger press Lightly tap the touchpad with three fingers to open the Search Windows. Three-finger swipe Swipe across the touchpad with three fingers. •...
26 - Using the Precision Touchpad The precision touchpad includes added technology features that help recognize and prevent unintentional gestures such as accidental taps, gestures, and pointer movement. Note The touchpad is sensitive to finger movement; the lighter the touch, the better the response. Please keep the touchpad and your fingers dry and clean.
Page 27
Using the Precision Touchpad - 27 use a mouse. Or you can adjust the touchpad sensitivity to suit your needs. Scroll down to see more settings.
87) do not help, you can recover your computer. This section describes the recovery tools available on your computer. Predator provides Acer Care Center, which allows you to reset your PC, refresh your PC, backup files/data or create a factory default backup. If you cannot access Acer Care Center, click Settings in the Start menu, select System >...
Page 29
Recovery - 29 3. Click Set up syncing for OneDrive folder syncing to continue. 4. Make sure the folders that you want to back up are selected and click Start back up to continue.
Page 30
30 - Recovery 5. You can select View sync progress to watch files sync until it completes. 6. To open the OneDrive folder, double click OneDrive icon in the notification area.
Recovery - 31 Backing up your wireless and LAN drivers Back up your wireless and LAN drivers. You can use these backups to install the wireless and LAN drivers if you install another operating system. 1. From Start, select Care Center in All apps list then Recovery Management.
Page 32
32 - Recovery 3. Click Reset PC to Choose an option. 4. Select Keep my files to refresh your PC and reinstall your operating system without removing your personal files.
Page 33
Recovery - 33 5. Choose from the two options - Cloud download or Local reinstall to reinstall Windows. (Ensure you are connected to the internet when using Cloud download.) 6. Click Change settings to open the Choose settings options.
Page 34
34 - Recovery 7. Choose your settings options and follow the instructions on screen. Click Confirm then Next to continue. Important If you have apps installed on your PC, they will be removed. 8. Resetting the PC will reinstall Windows, change settings back to their factory defaults and remove all preinstalled apps and programs without removing your personal files.
Recovery - 35 11.Follow the process until it completes. 12.When your PC has completed the reset process, Windows will have been reset back to its factory default settings without removing your personal files. Reset this PC and remove everything 1. From Start, select Care Center in All apps list then Recovery Management.
Page 36
36 - Recovery 3. Click Reset PC to Choose an option. 4. Select Remove everything to reset your PC back to its factory default.
Page 37
Recovery - 37 5. Choose from the two options - Cloud download or Local reinstall to reinstall Windows. (Ensure you are connected to the internet when using Cloud download.) 6. Click Change settings to open the Choose settings options.
Page 38
38 - Recovery 7. Choose your settings options and follow the instructions on screen. Click Confirm then Next to continue. 8. Click Reset to continue. 9. You will be shown the reset progress on the screen. The screen will turn off during the reset process. 10.The screen will turn back on when it is installing Windows.
Using a Bluetooth connection - 39 SI NG A LUETOOTH CO NNE CTIO N Bluetooth is a technology enabling you to transfer data wirelessly over short distances between many different types devices. Bluetooth-enabled devices include computers, cell phones, tablets, wireless headsets, and keyboards.
Page 40
40 - Using a Bluetooth connection 2. Click on Add device then select the device that you want to add. 3. Your computer will automatically start searching for devices, as well as make itself visible to other devices. 4. Select the device you wish to pair from the list of discovered devices.
Page 41
Using a Bluetooth connection - 41 You can also enter the Bluetooth settings by selecting the Network, Sound and Battery icon in the lower right-hand corner of the screen to open the Quick settings pane. From here, you can enable or disable Bluetooth or right-click on Bluetooth >...
42 - Connecting to the Internet ON NE CTI NG TO TH E NTERNET This chapter includes general information on types of connections, and getting connected to the internet. For detailed information, please refer to Network connections on page 99. Your computer’s built-in network features make it easy for you to connect your computer to the internet.
Page 43
Connecting to the Internet - 43 Predator computers feature a Flight mode hotkey that turns the network connection on or off. You can use the network management options to turn your wireless network on/off or control what is shared over the network.
Page 44
44 - Connecting to the Internet 4. You will see a list of available wireless networks. Select the one you wish to use. 5. Once you select a wireless network, select Connect. 6. If required, enter the network’s password.
Connecting to the Internet - 45 Connecting with a cable Built-in network feature If your computer has a network port, plug one end of a network cable into the network port on your computer, and the other end into a port on your router (refer to the image below.) Then, you'll be ready to get online.
46 - PredatorSense RE DAT OR E NSE PredatorSense allows you to switch operating modes and control behavior. Create scenario profiles synchronize the scenario setting with the associated apps. Multiple profiles allow you to quickly switch between lighting schemes. It also allows you to switch scenarios, monitor system performance, access apps quickly using the widget cards.
PredatorSense - 47 Widget cards Widget cards are always visible on all PredatorSense screens by default. If they are hidden, click the Widget icon. • In the Scenario Profile tab, you can select your preferred scenario profile, operating mode, adjust the performance of the fans, and select the lighting effect.
48 - PredatorSense PredatorSense settings Click the Settings icon to update the firmware manually and set the system to check for available updates on startup automatically. You can also change temperature units on this screen. Planet9 website and PC client download Click the Planet9 icon to view gaming updates.
PredatorSense - 49 Scenario Click the Scenario tab to manage scenarios, select an operating mode, control fans, adjust pulsar lighting settings, and configure advanced settings. Scenario Profiles You can create scenario profiles with customized operating mode, fan performance, lighting effect, Acer TrueHarmony setting, and linked apps.
Page 50
50 - PredatorSense Creating a New Scenario Profile To add a new profile, select New Scenario Profile then enter a new name for the profile and click Create. You can configure the scenario options for the new one. Note You can also add a New Scenario Profile directly from the System screen.
Page 51
PredatorSense - 51 Select the apps that you want to add and click Save. To remove the app, click the Delete icon next to the app. Note You can also link/unlink apps under the App Center tab. Hover the cursor over the app that you want to link and click the Adjust icon. Select the scenario profile from the System Scenario Profile drop- down list and click Save.
Page 52
52 - PredatorSense Managing scenario profiles You can customize a scenario profile both on the Scenario Manager screen or the Scenario screen from the drop-down list. Scenario Manager screen Scenario screen...
PredatorSense - 53 Operating Mode You can optimize your laptop with different modes using the widget cards or select the Mode tab for more information. You can set the system mode in AC power or on battery power. Lighting will show the color effect for a short period of time when changing modes.
54 - PredatorSense Fan control You may adjust the performance of the fans cooling your computer’s CPU and GPU. Three levels are available: Auto(default), Max and Custom. If you select Custom, then you will see two sliders that allow you to set GPU and CPU cooling independently. Click Auto to switch off the default setting and then adjust the value.
PredatorSense - 55 Adjusting the Pulsar Lighting Select Pulsar Lighting to see keyboard and others lighting options. Note To turn off the lighting effect for the keyboard or for the light bar, slide the lightning brightness to 0. Note To save the battery power, you can enable to turn the keyboard backlight off automatically if no action within 30 seconds.
Page 56
56 - PredatorSense Global lighting Click Global to customize the lighting effect for the keyboard and others simultaneously. Adjust the keyboard backlight brightness and select an animated light effect. Depending on the effect, you may customize its color, speed, and direction. Area lighting Click Area >...
Page 57
PredatorSense - 57 Keyboard-Static lighting The backlight colors of individual keys may be changed: select one or more keys (hold Ctrl and click or drag to select multiple keys), or select a set of keys (such as WASD or arrow keys) from the Select Zone drop-down list. Select a color from the color wheel or enter the RGB values manually.
Page 58
58 - PredatorSense Logo Each effect provides animation for logo colors. Depending on the effect, you may customize its color, speed, and brightness.
PredatorSense - 59 Adjusting the Advanced Settings Select Advanced Settings to adjust the audio mode under the Acer TrueHarmony tab. Under the Global Settings tab you can disable/enable sticky keys, LCD Overdrive, and system boot animation & sound. Boot Logo Customization Under the Boot Logo Customization tab, click the Image icon then browse to select your preferred image to customize the boot logo.
60 - PredatorSense Monitoring Select Monitoring to check CPU, GPU, and system temperature and loading, Data is shown for the last 60 minutes, so you can track your CPU, GPU and system’s status after performing different tasks.
PredatorSense - 61 App Center Click the App Center tab to quickly launch the installed app in your computer. If you cannot find the app in the list of all apps then use search, limit the list by displaying only preloaded apps or games, sort apps by popularity, alphabet, or by installation date.
62 - Bluelight Shield LU ELI G HT H IELD The Bluelight Shield can be enabled to reduce blue-light emissions from the screen to protect your eyes. To configure the Bluelight Shield, search for ’Quick Access’ in the Start Menu. From here you can toggle Bluelight Shield on or off, and you can choose from four different modes to fit your needs: No.
OLED Screen - 63 OL E D S CRE EN OLED screen is known for displaying near-perfect blacks and brilliant colors, which is delivers an incredible picture doesn’t need backlight compared to the LED panel. But OLED burn-in can occur if you use maximum settings for backlight, brightness, and contrast to display static images, and it might cause permanent burn-in damage to your OLED display.
Page 64
Keeping your computer and data safe... In this section you will find: • How to secure your computer • Setting passwords • What you need to prepare when you’re traveling • How to get the most out of your battery...
Securing your computer - 65 ECU RI NG YOUR CO MP UTE R Your computer is a valuable investment that you need to take care of. Learn how to protect and take care of your computer. Security features include hardware and software locks — a security notch and passwords.
66 - Securing your computer password checkpoints on boot-up and resume from Hibernation (if available) for maximum security. Important Do not forget your Supervisor Password! If you forget your password, please get in touch with your dealer or an authorized service center.
In addition to using an account password or PIN to sign in to Windows apps and services, you can also use the fingerprint reader to sign-in and unlock your Predator notebook. In order to use the fingerprint reader, you must first...
Page 68
68 - Fingerprint Reader 2. Set a PIN code. 3. In Windows Hello Fingerprint, select Set up to configure the fingerprint reader.
Page 69
Fingerprint Reader - 69 4. In the Windows Hello set up window, select Get started to begin the fingerprint configuration. 5. Enter your PIN to confirm your identity.
Page 70
70 - Fingerprint Reader 6. When the Windows Hello setup window appears, follow the onscreen directions. Press and hold your finger on the fingerprint sensor and then lift. Repeat this step until the fingerprint configuration is complete.
Page 71
Fingerprint Reader - 71 7. Once the fingerprint configuration is complete, you will be able to sign in or unlock your computer by placing your fingerprint on the fingerprint reader. You may select Add another finger to add another fingerprint to unlock the computer.
72 - BIOS utility B IO S UTIL ITY The BIOS utility is a hardware configuration program built into your computer's BIOS. Your computer is already properly configured and optimized, and you do not normally need to run this utility. However, if you encounter configuration problems, you may need to run To activate the BIOS utility, press F2 while the computer logo is being displayed.
Power management - 73 O WE R MANA GEMENT This computer has a built-in power management unit that monitors system activity. System activity refers to any activity involving one or more of the following devices: keyboard, mouse, hard disk, peripherals connected to the computer, and video memory.
Page 74
74 - Power management 3. Select Change settings that are currently unavailable. 4. Scroll down and disable Turn on fast start-up. 5. Select Save changes.
Battery pack - 75 AT TE RY PACK The computer uses an embedded Lithium battery that gives you long use between charges. Battery characteristics The battery is recharged whenever you connect the computer to the AC adapter. Your computer supports charge-in-use, enabling you to recharge the battery while you continue to operate the computer.
76 - Battery pack 6. Reconnect the AC adapter and fully charge the battery again. Follow these steps again until the battery has been charged and discharged three times. Use this conditioning process for all new batteries, or if a battery hasn't been used for a long time.
Battery pack - 77 • Store your PC in a cool, dry place. The recommended temperature is 10° C (50° F) to 30° C (86° F). Higher temperatures cause the battery to self-discharge faster. • Excessive recharging decreases the battery life. •...
78 - Traveling with your computer RAV EL I NG WITH Y OUR CO MPUTER This section gives you tips and hints to consider when moving around or traveling with your computer. Disconnecting from the desktop Follow these steps to disconnect your computer from external accessories: 1.
Page 79
Traveling with your computer - 79 from sliding around and cushion it if it should fall. Note The computer may enter Hibernation or Deep Sleep mode after being in Sleep mode for a period of time.
Page 80
Ports and connectors... In this section you will find: • Information on the ports and connectors fitted to your computer...
USB standards are currently available on Predator computers: USB 2.0 (High-speed USB) and USB 3.2 Gen 1/Gen 2 (SuperSpeed USB). USB 2.0 ports on Predator computers have a black tongue in the port, while USB 3.2 Gen 1/Gen 2 ports have a blue tongue.
The Type-C port is reversable; connectors may be inserted with either side up. Note On Predator computers USB Type-C ports support up to USB 3.2. Other USB devices with a USB Type-C connector are supported, but transfer speed may be reduced and certain functions will be disabled (such as Thunderbolt video support).
Thunderbolt 4 port - 83 HUNDE RBOL T P OR T A Thunderbolt 4 port allows you to easily connect devices with a Type-C connector to your computer, such as additional storage (e.g. an external drive), displays, other compatible device. Up to six devices, including displays, can be connected in series to a single Thunderbolt port.
84 - SD card reader CA RD R E ADER SD (Secure Digital) cards are used in a wide selection of digital cameras, tablets, media players and cellular phones. Inserting an SD card 1. Align the card so that the connector points towards the port, with the connectors facing down.
Video and audio connectors - 85 ID EO AND AU DIO CONNE CTORS Add an external monitor to your computer via a video port. The type of port available depends on your computer’s configuration. Connecting a monitor 1. Check that the computer is powered off and the monitor power switch is turned off.
86 - HDMI HD M I HDMI (High-Definition Multimedia Interface) is a high- quality, digital audio/video interface. HDMI allows you to connect any compatible digital audio/video source, such as your computer, a set-top box, DVD player, and audio/video receiver to any compatible digital audio and/or video monitor, such as a digital television (DTV) with a single cable.
Page 87
Got a question? In this section you will find: • Frequently asked questions • Tips for using Windows • Troubleshooting information • How to protect yourself while online • Where to find Acer service center contact information...
88 - Frequently asked questions RE Q UENT LY ASKED QUES TIONS The following is a list of possible situations that may arise during the use of your computer. Easy solutions are provided for each one. I turned on the power, but the computer does not start or boot up.
Page 89
Frequently asked questions - 89 • The computer may be in Sleep or Hibernate mode (if there is a power LED, it will flash). Press and release the power button to resume. No audio is heard from the computer. Check the following: •...
Enabled. 2. Exit the BIOS utility and save changes. The system will reboot. Note To access the BIOS utility, press F2 when you see the Predator logo during boot up. For more information, see Restoring your computer on page 31.
Page 91
Frequently asked questions - 91 Before you call Please have the following information available when you call Acer for online service, and please be at your computer when you call. With your support, we can reduce the amount of time a call takes and help solve your problems efficiently. If there are error messages or beeps reported by your computer, write them down as they appear on the screen (or the number and sequence in the case of beeps).
Fr eq u ent ly a s k 92 - Frequently asked questions Tips and hints for using Windows We know this is a new operating system that will take some getting used to, so we've created a few pointers to help you get started.
Frequently asked questions - 93 Can I change the screen resolution? Type 'Resolution' in the text box to display the results; select Display resolution. Alternatively, you can also right-click anywhere on the desktop and select Display settings > Display > Display resolution. Where are my apps? Move your cursor to the lower side of the screen and click search box, start typing the name of the app you would like...
94 - Frequently asked questions Do I need one? You need a Microsoft ID to use Windows 11. It makes life easier because you can sync data across different machines you sign in to using a Microsoft ID. How do I check for Windows updates? Press the Windows key or select the Windows Start button >...
F r equ en tly as k ed qu es ti ons Frequently asked questions - 95 Troubleshooting This chapter shows you how to deal with common system problems. Read it before calling a technician if a problem occurs. Solutions to more serious problems require opening up the computer.
Page 96
96 - Frequently asked questions Error messages Corrective action Hard disk 0 Contact your dealer or an authorized extended type service center. error Contact your dealer or an authorized I/O parity error service center. Keyboard error or Contact your dealer or an authorized no keyboard service center.
Internet and online security - 97 NTE RN ET AND ONLINE SE CUR ITY First steps on the net Protecting your computer It is vital to protect your computer from viruses and attacks over the internet (see Internet security software on page 101).
Page 98
98 - Internet and online security Dial-up Some computers include a telephone dial-up (‘modem’) connector. This allows you to connect to the internet using your telephone line. With a dial-up connection, you cannot use the modem and the telephone simultaneously on a single phone line.
Internet and online security - 99 internet while away from home. The socket for a SIM card may be built in to your computer, or may require an external device, such as a USB modem or even an appropriately equipped mobile phone. Note If your computer includes a SIM card slot, you require a compatible SIM card and a contract with a cellular provider.
Page 100
100 - Internet and online security Components of a wireless LAN To set up your Wireless network at home you need to have the following: Access point (router) Access points (routers) are two-way transceivers that broadcast data into the surrounding environment. Access points act as a mediator between wired and wireless network.
Internet and online security - 101 Surf the Net! To surf the internet, you need a program called an internet browser. Microsoft Edge provides an easy and secure web browsing experience. As soon as you have your internet access installed and you are connected, from the Start Menu, click the Microsoft Edge app or the icon located in the taskbar and take your internet experience to a new...
Page 102
102 - Internet and online security Staying ahead of cybercriminals Stay ahead of hackers and cybercriminals by understanding the tactics they use to access your private data. Ensure your software is up to date Cybercriminals rely heavily upon software or platform vulnerabilities, as they are the easiest way to sneak malware into a user's device unnoticed, sometimes with little action user's...
Page 103
Internet and online security - 103 personal information like social security or credit card numbers to someone that you don't know over the phone. Common threats cybercriminals use Now you know a few very common ways cybercriminals try to sneak onto your device or trick you into providing private information to them directly.
Page 104
104 - Internet and online security device is entirely under the control of the person who created the botnet. Most people who are infected with botnets aren't even aware that their computer's security has become compromised! What to do if you're infected: If you're infected you probably don't realize it as bots are notoriously quiet.
Page 105
Internet and online security - 105 programmed to "listen in" on transmissions, intercept data that is specifically targeted as valuable, and capture the data, such as your login credentials and passwords. Use a virtual private network (VPN) to ensure your privacy and anonymity are protected when you use public Wi-Fi.
Page 106
106 - Internet and online security programs do not work correctly, your computer may be infected by malicious software. However, do not blame every computer problem on a virus! If you suspect your computer is infected, the first thing to do is update, if you have not already done so, and run your antivirus and anti-spyware software.