Acer Aspire 6920 Service Guide
Here you can view all the pages of manual Acer Aspire 6920 Service Guide. The Acer manuals for Notebook are available online for free. You can easily download all the documents as PDF.
Page 21
Chapter 115 Move your finger across the touchpad (2) to move the cursor. Press the left (1) and right (4) buttons located beneath the touchpad to perform selection and execution functions. These two buttons are similar to the left and right buttons on a mouse. Tapping on the touchpad is the same as clicking the left button. Use the 4-way scroll (3) button to scroll up or down and move left or right a page. This button mimics your cursor pressing on the right scroll bar of Windows applications. NOTE:...
Page 22
16Chapter 1 Using the Keyboard The keyboard has full-sized keys and an embedded keypad, separate cursor keys, two Windows keys and twelve function keys. Lock Keys and embedded numeric keypad The keyboard has three lock keys which you can toggle on and off. The embedded numeric keypad functions like a desktop numeric keypad. It is indicated by small characters located on the upper right corner of the keycaps. To simplify the keyboard legend, cursor-control key symbols are not printed on the keys....
Page 23
Chapter 117 Windows Keys The keyboard has two keys that perform Windows-specific functions. Hot Keys The computer employs hotkeys or key combinations to access most of the computer’s controls like sreen brightness, volume output and the BIOS utility. To activate hot keys, press and hold the key before pressing the other key in the hotkey combination.
Page 24
18Chapter 1 Special Key You can locate the Euro symbol and US dollar sign at the upper-center and/or bottom-right of your keyboard. To t y p e :
Page 25
Chapter 119 The Euro symbol 1. Open a text editor or word processor. 2.Either directly press the symbol at the bottom-right of the keyboard, or hold and then press the symbol at the upper-center of the keyboard. NOTE: Some fonts and software do not support the Euro symbol. Please refer to www.microsoft.com/ typography/faq/faq12.htm for more information. The US dollar sign 1.Open a text editor or word processor. 2.Either directly press the key at the bottom-right of the keyboard, or hold and then...
Page 26
20Chapter 1 Acer Empowering Technology Acer’s innovative Empowering Technology makes it easy for you to access frequently used functions and manage your new Acer notebook. It features the following handy utilities: • Acer eAudio Management allows you to easily control the enhanced sound effects of Dolby Home Theater on your system. • Acer ePower Management optimizes battery usage via customizable power plans. • Acer...
Page 27
Chapter 121 7 Make sure the box Use for Acer eRecovery Management is checked. 8 Click OK to set the password. Acer eAudio Management Acer eAudio Management allows you to easily control the enhanced sound effects of Dolby Home Theater on your system. Select Movie or Game mode to experience the awesome realism of 5.1-channel audio output from the speakers fitted to your system via Dolby Surround sound technology. Music mode lets you enjoy your favorite tunes, in vivid detail.
Page 28
22Chapter 1 To choose your playback device, click the icon on the upper right side of the Acer eAudio Management window. Acer ePower Management Acer ePower Management features a straightforward user interface for configuring your power management options. To access this utility, select Acer ePower Management from the Empowering Technology toolbar, run the program from the Acer Empowering Technology program group in Start menu, or right-click the Windows power icon in the system tray and select Acer...
Page 29
Chapter 123 For additional options, click “Settings” to: Set alarms. Re-load factory defaults. Select what actions will be taken when the cover is closed or the power button is pressed. View information about Acer ePower Management. Acer eDataSecurity Management (for selected models) Acer eDataSecurity Management is an encryption utility that protects your files from being accessed by unauthorized persons. It is conveniently integrated with Windows Explorer as a shell...