Acer Aspire Switch 10 User Manual
Here you can view all the pages of manual Acer Aspire Switch 10 User Manual. The Acer manuals for Notebook are available online for free. You can easily download all the documents as PDF.
Page 31
Recovery - 31 2. The Refresh your PC window opens. Images for reference only. 3. Click Next, then Refresh. 4. The recovery process begins by restarting your computer, then continues by copying files to your hard drive. This process takes about 30 minutes. Recovering from a recovery backup To recover from a recovery backup on a USB drive: 1. Find your recovery backup. 2. If your computer does not have a built-in keyboard, make sure a keyboard is attached to your computer. 3. Plug in the USB drive and...
Page 32
32 - Recovery b. Windows starts from the recovery backup instead of the normal startup process. 6. Select your keyboard type. 7. Select Troubleshoot and then choose the type of recovery to use: a. Click Advanced then System Restore to start Microsoft System Restore: Microsoft System Restore periodically takes a ’snapshot’ of your system settings and saves them as restore points. In most cases of hard-to-resolve software problems, you can return to one of these restore points to get your system...
Page 33
Recovery - 33 2. Click Next. 3. Select the operating system to recover (normally only one option is available). 4. Choose to keep any changes to the hard drive: a. If you have deleted the recovery partition or otherwise changed the partitions on the hard drive and want to keep these changes, select No. b. To restore your computer to Factory Settings, select Ye s. 5. Choose how to erase your files: a.Just remove my files quickly erases all files before restoring your computer and takes about 30...
Page 34
34 - Connecting to the Internet CONNECTING TO THE INTERNET This chapter includes basic information on types of connections, and getting connected to the Internet. For detailed information, please refer to Network connections on page 68. Connecting wirelessly Connecting to a wireless LAN A wireless LAN (or WLAN) is a wireless local area network, which can link two or more computers without using wires. Once connected to WLAN, you can access the Internet. You can also share files, other devices, and...
Page 35
Using a Bluetooth connection - 35 USING A BLUETOOTH CONNECTION Bluetooth is a technology enabling you to transfer data wirelessly over short distances between many different types of devices. Bluetooth- enabled devices include computers, cell phones, tablets, wireless headsets, and keyboards. To use Bluetooth, you must ensure the following: 1. Bluetooth is enabled on both devices. 2. Your devices are paired (or connected). Enabling and disabling Bluetooth The Bluetooth adapter must be enabled on both...
Page 36
36 - Using a Bluetooth connection 4. Tap the device you wish to add from the list of discovered devices, and tap Pair. A code displays on your computer, which should match the code displayed on your device. Select Yes. Then, accept the pairing from your device. Note Some devices using older versions of the Bluetooth technology require both devices to enter a PIN. In the case of one of the devices not having any inputs (as in a headset), the passcode is hardcoded into the device (usually 0000 or...
Page 37
- 37 Keeping your computer and data safe... In this section you will find: • How to secure your computer • Setting passwords • What you need to prepare when you’re traveling • How to get the most out of your battery
Page 38
38 - BIOS utility BIOS UTILITY The BIOS utility is a hardware configuration program built into your computers BIOS. Your computer is already properly configured and optimized, and you do not normally need to run this utility. However, if you encounter configuration problems, you may need to run it. To activate the BIOS utility, press during the POST while the computer logo is being displayed. To activate the BIOS utility in tablet mode, press and hold the power button and the volume up button for...
Page 39
Securing your computer - 39 SECURING YOUR COMPUTER Your computer is a valuable investment that you need to take care of. Learn how to protect and take care of your computer. Using passwords Passwords protect your computer from unauthorized access. Setting these passwords creates several different levels of protection for your computer and data: • Supervisor Password prevents unauthorized entry into the BIOS utility. Once set, you must enter this password to gain access to the BIOS utility. See...
Page 40
40 - Securing your computer • Type the User Password and press to use the computer. If you enter the password incorrectly, a warning message appears. Try again and press . Important You have three chances to enter a password. If you fail to enter the password correctly after three tries, the system halts. Press and hold the power button for four seconds to shut down the computer. Then turn on the computer again, and try again.